docker-compose-files/hyperledger_fabric/latest/raft/logs/dev_all.log

6.3 MiB
Raw Blame History

Attaching to peer0.org2.example.com, peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, orderer1.example.com, fabric-cli, orderer2.example.com, orderer0.example.com
peer0.org1.example.com | "2019-05-02 09:27:08.750 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP"
peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value"
peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW"
peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW"
peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value"
peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2"
peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256"
peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256"
peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore"
peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input"
peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string "
peer0.org1.example.com | "2019-05-02 09:27:08.755 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11"
peer0.org1.example.com | "2019-05-02 09:27:08.756 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.756 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Pin setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.757 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.758 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Hash setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.758 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Security setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore"
peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.760 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.760 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.761 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Library setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.Label setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:<nil>] Hash:<nil> Label:<nil> Library:<nil> Pin:<nil> Security:<nil>] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]"
peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done"
peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]"
peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts"
peer0.org1.example.com | "2019-05-02 09:27:08.773 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem"
peer0.org1.example.com | "2019-05-02 09:27:08.777 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts"
peer0.org1.example.com | "2019-05-02 09:27:08.782 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem"
peer0.org1.example.com | "2019-05-02 09:27:08.785 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts"
peer0.org1.example.com | "2019-05-02 09:27:08.789 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem"
peer0.org1.example.com | "2019-05-02 09:27:08.791 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts"
peer0.org1.example.com | "2019-05-02 09:27:08.792 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]"
peer0.org1.example.com | "2019-05-02 09:27:08.793 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts"
peer0.org1.example.com | "2019-05-02 09:27:08.796 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem"
peer0.org1.example.com | "2019-05-02 09:27:08.799 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts"
peer0.org1.example.com | "2019-05-02 09:27:08.800 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]"
peer0.org1.example.com | "2019-05-02 09:27:08.800 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls"
peer0.org1.example.com | "2019-05-02 09:27:08.801 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]"
peer0.org1.example.com | "2019-05-02 09:27:08.804 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs"
peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP"
peer0.org1.example.com | "2019-05-02 09:27:08.813 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:08.814 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer1.org1.example.com | "2019-05-02 09:27:08.841 UTC [nodeCmd] serve -> INFO 001 Starting peer:
peer1.org1.example.com | Version: 2.0.0
peer1.org1.example.com | Commit SHA: development build
peer1.org1.example.com | Go version: go1.12.4
peer1.org1.example.com | OS/Arch: linux/amd64
peer1.org1.example.com | Chaincode:
peer1.org1.example.com | Base Docker Namespace: hyperledger
peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric
peer1.org1.example.com | Docker Namespace: hyperledger"
peer1.org1.example.com | "2019-05-02 09:27:08.845 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.6:7051"
peer1.org1.example.com | "2019-05-02 09:27:08.845 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051"
peer1.org1.example.com | "2019-05-02 09:27:08.850 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt"
peer1.org1.example.com | "2019-05-02 09:27:09.016 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized"
peer1.org1.example.com | "2019-05-02 09:27:09.017 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes"
peer1.org1.example.com | "2019-05-02 09:27:09.041 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled"
peer1.org1.example.com | "2019-05-02 09:27:09.051 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com"
peer1.org1.example.com | "2019-05-02 09:27:09.052 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org1.example.com:7052"
peer1.org1.example.com | "2019-05-02 09:27:09.080 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered"
peer1.org1.example.com | "2019-05-02 09:27:09.081 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered"
peer1.org1.example.com | "2019-05-02 09:27:09.081 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered"
peer1.org1.example.com | "2019-05-02 09:27:09.082 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered"
peer1.org1.example.com | "2019-05-02 09:27:09.128 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]"
peer1.org1.example.com | "2019-05-02 09:27:09.135 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: "
peer1.org1.example.com | "2019-05-02 09:27:09.139 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org1.example.com:7051 started"
peer1.org1.example.com | "2019-05-02 09:27:09.154 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:09.168 UTC [cscc] Init -> INFO 012 Init CSCC"
peer1.org1.example.com | "2019-05-02 09:27:09.172 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:09.176 UTC [qscc] Init -> INFO 014 Init QSCC"
peer1.org1.example.com | "2019-05-02 09:27:09.178 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:09.179 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer1.org1.example.com | "2019-05-02 09:27:09.179 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes"
peer1.org1.example.com | "2019-05-02 09:27:09.183 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000"
peer1.org1.example.com | "2019-05-02 09:27:09.183 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated"
peer1.org1.example.com | "2019-05-02 09:27:09.184 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]"
peer1.org1.example.com | "2019-05-02 09:27:09.184 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]"
peer1.org1.example.com | "2019-05-02 09:27:16.487 UTC [endorser] callChaincode -> INFO 01c [][f532fb0e] Entry chaincode: name:"cscc" "
peer1.org1.example.com | "2019-05-02 09:27:16.500 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block"
peer1.org1.example.com | "2019-05-02 09:27:16.506 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage"
peer1.org1.example.com | "2019-05-02 09:27:16.529 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=9ms state_commit=2ms)"
peer1.org1.example.com | "2019-05-02 09:27:16.531 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block"
peer1.org1.example.com | "2019-05-02 09:27:16.539 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations"
peer1.org1.example.com | "2019-05-02 09:27:16.539 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer1.org1.example.com | "2019-05-02 09:27:16.540 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org1MSP for channel businesschannel to learn about"
peer1.org1.example.com | "2019-05-02 09:27:16.567 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1"
peer1.org1.example.com | "2019-05-02 09:27:16.570 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:16.571 UTC [cscc] Init -> INFO 026 Init CSCC"
peer1.org1.example.com | "2019-05-02 09:27:16.571 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:16.572 UTC [qscc] Init -> INFO 028 Init QSCC"
peer1.org1.example.com | "2019-05-02 09:27:16.572 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer1.org1.example.com | "2019-05-02 09:27:16.573 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer1.org1.example.com | "2019-05-02 09:27:16.574 UTC [endorser] callChaincode -> INFO 02b [][f532fb0e] Exit chaincode: name:"cscc" (83ms)"
peer1.org1.example.com | "2019-05-02 09:27:16.574 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55336 grpc.code=OK grpc.call_duration=88.0261ms
peer1.org1.example.com | "2019-05-02 09:27:17.674 UTC [endorser] callChaincode -> INFO 02d [][061aeb3a] Entry chaincode: name:"cscc" "
peer1.org1.example.com | "2019-05-02 09:27:17.675 UTC [endorser] callChaincode -> INFO 02e [][061aeb3a] Exit chaincode: name:"cscc" (1ms)"
peer1.org1.example.com | "2019-05-02 09:27:17.676 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55344 grpc.code=OK grpc.call_duration=2.2942ms
peer1.org1.example.com | "2019-05-02 09:27:18.618 UTC [endorser] callChaincode -> INFO 030 [][1d2a8972] Entry chaincode: name:"qscc" "
peer1.org1.example.com | "2019-05-02 09:27:18.620 UTC [endorser] callChaincode -> INFO 031 [][1d2a8972] Exit chaincode: name:"qscc" (2ms)"
peer1.org1.example.com | "2019-05-02 09:27:18.621 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55352 grpc.code=OK grpc.call_duration=3.6828ms
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:08.815 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:08.816 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:08.819 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..."
peer0.org1.example.com | "2019-05-02 09:27:08.823 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:08.824 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC"
peer0.org1.example.com | "2019-05-02 09:27:08.825 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:08.825 UTC [nodeCmd] serve -> INFO 037 Starting peer:
peer0.org1.example.com | Version: 2.0.0
peer0.org1.example.com | Commit SHA: development build
peer0.org1.example.com | Go version: go1.12.4
peer0.org1.example.com | OS/Arch: linux/amd64
peer0.org1.example.com | Chaincode:
peer0.org1.example.com | Base Docker Namespace: hyperledger
peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric
peer0.org1.example.com | Docker Namespace: hyperledger"
peer0.org1.example.com | "2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 172.18.0.7:7051"
peer0.org1.example.com | "2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:08.841 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity"
peer0.org1.example.com | "2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 "
peer0.org1.example.com | "2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 "
peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt"
peer1.org1.example.com | "2019-05-02 09:27:21.542 UTC [gossip.channel] reportMembershipChanges -> INFO 033 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]"
peer1.org1.example.com | "2019-05-02 09:27:22.349 UTC [gossip.election] leaderElection -> INFO 034 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader"
peer1.org1.example.com | "2019-05-02 09:27:22.378 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations"
peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org1.example.com | "2019-05-02 09:27:22.396 UTC [gossip.service] updateEndpoints -> WARN 039 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found"
peer1.org1.example.com | "2019-05-02 09:27:22.408 UTC [committer.txvalidator] Validate -> INFO 03a [businesschannel] Validated block [1] in 30ms"
peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.comm] func1 -> WARN 03b peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF"
peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03c Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]"
peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03d Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: "
peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03e Exiting"
peer1.org1.example.com | "2019-05-02 09:27:22.426 UTC [kvledger] CommitWithPvtData -> INFO 03f [businesschannel] Committed block [1] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=11ms state_commit=2ms)"
peer1.org1.example.com | "2019-05-02 09:27:22.427 UTC [gossip.privdata] StoreBlock -> INFO 040 [businesschannel] Received block [2] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:22.444 UTC [gossip.gossip] JoinChan -> INFO 041 Joining gossip network of channel businesschannel with 2 organizations"
peer1.org1.example.com | "2019-05-02 09:27:22.444 UTC [gossip.gossip] learnAnchorPeers -> INFO 042 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org1.example.com | "2019-05-02 09:27:22.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 043 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer1.org1.example.com | "2019-05-02 09:27:22.445 UTC [gossip.service] updateEndpoints -> WARN 044 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found"
peer1.org1.example.com | "2019-05-02 09:27:22.463 UTC [committer.txvalidator] Validate -> INFO 045 [businesschannel] Validated block [2] in 35ms"
peer1.org1.example.com | "2019-05-02 09:27:22.495 UTC [kvledger] CommitWithPvtData -> INFO 046 [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=1ms block_commit=22ms state_commit=4ms)"
peer1.org1.example.com | "2019-05-02 09:27:25.851 UTC [endorser] callChaincode -> INFO 047 [][9f77e471] Entry chaincode: name:"_lifecycle" "
peer1.org1.example.com | "2019-05-02 09:27:25.853 UTC [endorser] callChaincode -> INFO 048 [][9f77e471] Exit chaincode: name:"_lifecycle" (1ms)"
peer1.org1.example.com | "2019-05-02 09:27:25.853 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55408 grpc.code=OK grpc.call_duration=2.1499ms
peer1.org1.example.com | "2019-05-02 09:27:26.539 UTC [gossip.channel] reportMembershipChanges -> INFO 04a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]"
peer1.org1.example.com | "2019-05-02 09:27:29.026 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:31.026Z grpc.peer_address=172.18.0.5:33146 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.3µs
peer1.org1.example.com | "2019-05-02 09:27:30.032 UTC [gossip.privdata] StoreBlock -> INFO 04c [businesschannel] Received block [3] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:30.065 UTC [committer.txvalidator] Validate -> INFO 04d [businesschannel] Validated block [3] in 32ms"
peer1.org1.example.com | "2019-05-02 09:27:30.103 UTC [gossip.privdata] StoreBlock -> INFO 04e [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (21ms)"
peer1.org1.example.com | "2019-05-02 09:27:30.105 UTC [confighistory] HandleStateUpdates -> ERRO 04f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0034fe5c0)}"
peer1.org1.example.com | "2019-05-02 09:27:30.138 UTC [kvledger] CommitWithPvtData -> INFO 050 [businesschannel] Committed block [3] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=27ms state_commit=3ms)"
peer1.org1.example.com | "2019-05-02 09:27:32.541 UTC [gossip.privdata] StoreBlock -> INFO 051 [businesschannel] Received block [4] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:32.572 UTC [committer.txvalidator] Validate -> INFO 052 [businesschannel] Validated block [4] in 30ms"
peer1.org1.example.com | "2019-05-02 09:27:32.640 UTC [confighistory] HandleStateUpdates -> ERRO 053 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003632be0)}"
peer1.org1.example.com | "2019-05-02 09:27:32.680 UTC [kvledger] CommitWithPvtData -> INFO 054 [businesschannel] Committed block [4] with 1 transaction(s) in 80ms (state_validation=39ms block_commit=22ms state_commit=13ms)"
peer1.org1.example.com | "2019-05-02 09:27:36.541 UTC [gossip.channel] reportMembershipChanges -> INFO 055 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]"
peer1.org1.example.com | "2019-05-02 09:27:36.833 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [5] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:36.851 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [5] in 18ms"
peer1.org1.example.com | "2019-05-02 09:27:36.881 UTC [lifecycle] update -> INFO 058 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'"
peer1.org1.example.com | "2019-05-02 09:27:36.901 UTC [lifecycle] update -> INFO 059 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0"
peer1.org1.example.com | "2019-05-02 09:27:36.902 UTC [cceventmgmt] HandleStateUpdates -> INFO 05a Channel [businesschannel]: Handling deploy or update of chaincode [exp02]"
peer1.org1.example.com | "2019-05-02 09:27:36.903 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05b Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory"
peer1.org1.example.com | "2019-05-02 09:27:36.904 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05c Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement"
peer1.org1.example.com | "2019-05-02 09:27:36.953 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [5] with 1 transaction(s) in 82ms (state_validation=41ms block_commit=28ms state_commit=10ms)"
peer1.org1.example.com | "2019-05-02 09:27:41.432 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [6] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:41.438 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [6] in 5ms"
peer1.org1.example.com | "2019-05-02 09:27:41.463 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [6] with 1 transaction(s) in 23ms (state_validation=0ms block_commit=15ms state_commit=3ms)"
peer1.org1.example.com | "2019-05-02 09:27:47.012 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [7] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:47.015 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [7] in 2ms"
peer1.org1.example.com | "2019-05-02 09:27:47.032 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [7] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=10ms state_commit=2ms)"
peer1.org1.example.com | "2019-05-02 09:27:49.828 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [8] from buffer"
peer1.org1.example.com | "2019-05-02 09:27:49.833 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [8] in 3ms"
peer1.org1.example.com | "2019-05-02 09:27:49.857 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=14ms state_commit=4ms)"
peer1.org1.example.com | "2019-05-02 09:28:04.081 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [9] from buffer"
peer1.org1.example.com | "2019-05-02 09:28:04.149 UTC [cauthdsl] deduplicate -> WARN 068 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer1.org1.example.com | "2019-05-02 09:28:04.165 UTC [cauthdsl] deduplicate -> WARN 069 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer1.org1.example.com | "2019-05-02 09:28:04.259 UTC [gossip.gossip] JoinChan -> INFO 06a Joining gossip network of channel businesschannel with 3 organizations"
peer1.org1.example.com | "2019-05-02 09:28:04.259 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 06c No configured anchor peers of Org3MSP for channel businesschannel to learn about"
peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.service] updateEndpoints -> WARN 06e Failed to update ordering service endpoints, due to Channel with businesschannel id was not found"
peer1.org1.example.com | "2019-05-02 09:28:04.317 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [9] in 235ms"
peer1.org1.example.com | "2019-05-02 09:28:04.367 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [9] with 1 transaction(s) in 45ms (state_validation=10ms block_commit=22ms state_commit=8ms)"
peer1.org1.example.com | "2019-05-02 09:28:04.476 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.475Z grpc.peer_address=172.18.0.7:52992 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=421.1µs
peer1.org1.example.com | "2019-05-02 09:28:04.504 UTC [gossip.comm] func1 -> WARN 072 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF"
peer1.org1.example.com | "2019-05-02 09:28:04.505 UTC [gossip.discovery] expireDeadMembers -> WARN 073 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]"
peer1.org1.example.com | "2019-05-02 09:28:04.505 UTC [gossip.discovery] expireDeadMembers -> WARN 074 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: "
peer1.org1.example.com | "2019-05-02 09:28:04.506 UTC [gossip.discovery] expireDeadMembers -> WARN 075 Exiting"
peer1.org1.example.com | "2019-05-02 09:28:04.558 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.558Z grpc.peer_address=172.18.0.9:36456 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.7µs
peer1.org1.example.com | "2019-05-02 09:28:18.402 UTC [endorser] callChaincode -> INFO 077 [][d54146cd] Entry chaincode: name:"cscc" "
peer1.org1.example.com | "2019-05-02 09:28:18.403 UTC [endorser] callChaincode -> INFO 078 [][d54146cd] Exit chaincode: name:"cscc" (1ms)"
peer1.org1.example.com | "2019-05-02 09:28:18.404 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55626 grpc.code=OK grpc.call_duration=2.6411ms
peer1.org1.example.com | "2019-05-02 09:28:19.633 UTC [endorser] callChaincode -> INFO 07a [][a0a21417] Entry chaincode: name:"qscc" "
peer1.org1.example.com | "2019-05-02 09:28:19.638 UTC [endorser] callChaincode -> INFO 07b [][a0a21417] Exit chaincode: name:"qscc" (4ms)"
peer1.org1.example.com | "2019-05-02 09:28:19.638 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55634 grpc.code=OK grpc.call_duration=5.6728ms
peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]"
peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.882 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]"
peer0.org1.example.com | "2019-05-02 09:27:08.882 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.883 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.899 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]"
peer0.org1.example.com | "2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 047 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb"
peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [kvledger.util] CreateDirIfMissing -> DEBU 048 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]"
peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [nodeCmd] serve -> INFO 001 Starting peer:
peer0.org2.example.com | Version: 2.0.0
peer0.org2.example.com | Commit SHA: development build
peer0.org2.example.com | Go version: go1.12.4
peer0.org2.example.com | OS/Arch: linux/amd64
peer0.org2.example.com | Chaincode:
peer0.org2.example.com | Base Docker Namespace: hyperledger
peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric
peer0.org2.example.com | Docker Namespace: hyperledger"
peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.9:7051"
peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051"
peer0.org2.example.com | "2019-05-02 09:27:08.936 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt"
peer0.org2.example.com | "2019-05-02 09:27:09.121 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized"
peer0.org2.example.com | "2019-05-02 09:27:09.125 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes"
peer0.org2.example.com | "2019-05-02 09:27:09.151 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled"
peer0.org2.example.com | "2019-05-02 09:27:09.159 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com"
peer0.org2.example.com | "2019-05-02 09:27:09.159 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer0.org2.example.com:7052"
peer0.org2.example.com | "2019-05-02 09:27:09.182 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered"
peer0.org2.example.com | "2019-05-02 09:27:09.184 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered"
peer0.org2.example.com | "2019-05-02 09:27:09.185 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered"
peer0.org2.example.com | "2019-05-02 09:27:09.186 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered"
peer0.org2.example.com | "2019-05-02 09:27:09.201 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]"
peer0.org2.example.com | "2019-05-02 09:27:09.214 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: "
peer0.org2.example.com | "2019-05-02 09:27:09.215 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer0.org2.example.com:7051 started"
peer0.org2.example.com | "2019-05-02 09:27:09.217 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:09.219 UTC [cscc] Init -> INFO 012 Init CSCC"
peer0.org2.example.com | "2019-05-02 09:27:09.219 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:09.221 UTC [qscc] Init -> INFO 014 Init QSCC"
peer0.org2.example.com | "2019-05-02 09:27:09.221 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:09.222 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer0.org2.example.com | "2019-05-02 09:27:09.223 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes"
peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000"
peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated"
peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]"
peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]"
peer0.org2.example.com | "2019-05-02 09:27:16.739 UTC [endorser] callChaincode -> INFO 01c [][9da8f6fe] Entry chaincode: name:"cscc" "
peer0.org2.example.com | "2019-05-02 09:27:16.745 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block"
peer0.org2.example.com | "2019-05-02 09:27:16.749 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage"
peer0.org2.example.com | "2019-05-02 09:27:16.774 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=9ms state_commit=3ms)"
peer0.org2.example.com | "2019-05-02 09:27:16.776 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block"
peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations"
peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about"
peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer0.org2.example.com | "2019-05-02 09:27:16.811 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1"
peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [cscc] Init -> INFO 026 Init CSCC"
peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:16.814 UTC [qscc] Init -> INFO 028 Init QSCC"
peer0.org2.example.com | "2019-05-02 09:27:16.814 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer0.org2.example.com | "2019-05-02 09:27:16.815 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [kvledger.util] logDirStatus -> DEBU 049 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.925 UTC [kvledger.util] logDirStatus -> DEBU 04a After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [confighistory] newDBProvider -> DEBU 04b Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory"
peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]"
peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.966 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]"
peer0.org1.example.com | "2019-05-02 09:27:08.966 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.967 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb"
peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]"
peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists"
peer0.org1.example.com | "2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger"
peer0.org1.example.com | "2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery"
peer0.org1.example.com | "2019-05-02 09:27:08.995 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized"
peer0.org1.example.com | "2019-05-02 09:27:08.995 UTC [lifecycle] InitializeLocalChaincodes -> INFO 059 Initialized lifecycle cache with 0 already installed chaincodes"
peer0.org1.example.com | "2019-05-02 09:27:09.018 UTC [nodeCmd] serve -> INFO 05a Starting peer with TLS enabled"
peer0.org1.example.com | "2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05b Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com"
peer0.org1.example.com | "2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05c Exit with ccEndpoint: peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05d Registering chaincode instance: lscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 05e system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered"
peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: cscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 060 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered"
peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [sccapi] registerSysCC -> INFO 062 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered"
peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.053 UTC [sccapi] registerSysCC -> INFO 064 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered"
peer0.org1.example.com | "2019-05-02 09:27:09.053 UTC [nodeCmd] serve -> DEBU 065 Running peer"
peer0.org1.example.com | "2019-05-02 09:27:09.054 UTC [msp] GetDefaultSigningIdentity -> DEBU 066 Obtaining default signing identity"
peer0.org1.example.com | "2019-05-02 09:27:09.054 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for peer.handlers"
peer0.org1.example.com | "2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for peer.handlers.validators"
peer0.org1.example.com | "2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers.validators.vscc"
peer0.org1.example.com | "2019-05-02 09:27:09.057 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value"
peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation"
peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.validators.vscc.library setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:09.059 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]"
peer0.org1.example.com | "2019-05-02 09:27:09.059 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]"
peer0.org1.example.com | "2019-05-02 09:27:09.060 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]"
peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]"
peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers"
peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[string]interface{} value for peer.handlers.endorsers.escc"
peer0.org1.example.com | "2019-05-02 09:27:09.062 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value"
peer0.org1.example.com | "2019-05-02 09:27:09.062 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:09.063 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: <nil>"
peer0.org2.example.com | "2019-05-02 09:27:16.815 UTC [endorser] callChaincode -> INFO 02b [][9da8f6fe] Exit chaincode: name:"cscc" (76ms)"
peer0.org2.example.com | "2019-05-02 09:27:16.816 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59834 grpc.code=OK grpc.call_duration=77.929ms
peer0.org2.example.com | "2019-05-02 09:27:17.823 UTC [endorser] callChaincode -> INFO 02d [][4e36756d] Entry chaincode: name:"cscc" "
peer0.org2.example.com | "2019-05-02 09:27:17.824 UTC [endorser] callChaincode -> INFO 02e [][4e36756d] Exit chaincode: name:"cscc" (1ms)"
peer0.org2.example.com | "2019-05-02 09:27:17.824 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59842 grpc.code=OK grpc.call_duration=2.246ms
peer0.org2.example.com | "2019-05-02 09:27:18.801 UTC [endorser] callChaincode -> INFO 030 [][d706e86c] Entry chaincode: name:"qscc" "
peer0.org2.example.com | "2019-05-02 09:27:18.803 UTC [endorser] callChaincode -> INFO 031 [][d706e86c] Exit chaincode: name:"qscc" (2ms)"
peer0.org2.example.com | "2019-05-02 09:27:18.804 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59850 grpc.code=OK grpc.call_duration=3.9ms
peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [nodeCmd] serve -> INFO 001 Starting peer:
peer1.org2.example.com | Version: 2.0.0
peer1.org2.example.com | Commit SHA: development build
peer1.org2.example.com | Go version: go1.12.4
peer1.org2.example.com | OS/Arch: linux/amd64
peer1.org2.example.com | Chaincode:
peer1.org2.example.com | Base Docker Namespace: hyperledger
peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric
peer1.org2.example.com | Docker Namespace: hyperledger"
peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.5:7051"
peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051"
peer1.org2.example.com | "2019-05-02 09:27:08.532 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt"
peer1.org2.example.com | "2019-05-02 09:27:08.678 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized"
peer1.org2.example.com | "2019-05-02 09:27:08.679 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes"
peer1.org2.example.com | "2019-05-02 09:27:08.711 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled"
peer1.org2.example.com | "2019-05-02 09:27:08.724 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com"
peer1.org2.example.com | "2019-05-02 09:27:08.724 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org2.example.com:7052"
peer1.org2.example.com | "2019-05-02 09:27:08.760 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered"
peer1.org2.example.com | "2019-05-02 09:27:08.762 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered"
peer1.org2.example.com | "2019-05-02 09:27:08.764 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered"
peer1.org2.example.com | "2019-05-02 09:27:08.767 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered"
peer1.org2.example.com | "2019-05-02 09:27:08.843 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]"
peer1.org2.example.com | "2019-05-02 09:27:08.856 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: "
peer1.org2.example.com | "2019-05-02 09:27:08.870 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org2.example.com:7051 started"
peer1.org2.example.com | "2019-05-02 09:27:08.872 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:08.874 UTC [cscc] Init -> INFO 012 Init CSCC"
peer1.org2.example.com | "2019-05-02 09:27:08.875 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:08.880 UTC [qscc] Init -> INFO 014 Init QSCC"
peer1.org2.example.com | "2019-05-02 09:27:08.881 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:08.886 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer1.org2.example.com | "2019-05-02 09:27:08.886 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes"
peer1.org2.example.com | "2019-05-02 09:27:08.889 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000"
peer1.org2.example.com | "2019-05-02 09:27:08.890 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated"
peer1.org2.example.com | "2019-05-02 09:27:08.890 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]"
peer1.org2.example.com | "2019-05-02 09:27:08.895 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]"
peer1.org2.example.com | "2019-05-02 09:27:16.963 UTC [endorser] callChaincode -> INFO 01c [][9abb0a6c] Entry chaincode: name:"cscc" "
peer1.org2.example.com | "2019-05-02 09:27:16.969 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block"
peer1.org2.example.com | "2019-05-02 09:27:16.972 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage"
peer1.org2.example.com | "2019-05-02 09:27:17.004 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 26ms (state_validation=1ms block_commit=11ms state_commit=11ms)"
peer1.org2.example.com | "2019-05-02 09:27:17.008 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block"
peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations"
peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about"
peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer1.org2.example.com | "2019-05-02 09:27:17.041 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1"
peer1.org2.example.com | "2019-05-02 09:27:17.043 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:17.044 UTC [cscc] Init -> INFO 026 Init CSCC"
peer1.org2.example.com | "2019-05-02 09:27:17.044 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:17.045 UTC [qscc] Init -> INFO 028 Init QSCC"
peer1.org2.example.com | "2019-05-02 09:27:17.046 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer1.org2.example.com | "2019-05-02 09:27:17.046 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer0.org1.example.com | "2019-05-02 09:27:09.064 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.endorsers.escc.library setting to <nil> <nil>"
peer0.org1.example.com | "2019-05-02 09:27:09.068 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 078 map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library:<nil> name:DefaultEndorsement]] validators:map[vscc:map[library:<nil> name:DefaultValidation]]]]"
peer0.org1.example.com | "2019-05-02 09:27:09.080 UTC [gossip.service] func1 -> INFO 079 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]"
peer0.org1.example.com | "2019-05-02 09:27:09.086 UTC [msp] DeserializeIdentity -> DEBU 07a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:09.087 UTC [msp.identity] newIdentity -> DEBU 07b Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:09.088 UTC [msp] Validate -> DEBU 07c MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07d Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 07e Sleeping 25s"
peer0.org1.example.com | "2019-05-02 09:27:09.090 UTC [gossip.gossip] NewGossipService -> INFO 07f Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: "
peer0.org1.example.com | "2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 080 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 081 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B "
peer0.org1.example.com | "2019-05-02 09:27:09.094 UTC [gossip.pull] Add -> DEBU 082 Added <20>P=_m;<3B><><EFBFBD>_v~<7E><><EFBFBD>uJk8)<29><><EFBFBD>6h<36>56<>-, total items: 1"
peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [gossip.gossip] start -> INFO 083 Gossip instance peer0.org1.example.com:7051 started"
peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [gossip.gossip] syncDiscovery -> DEBU 084 Entering discovery sync with interval 4s"
peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 085 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 086 Sign: digest: 27FF9427800FE3DD452432775CD6BAEFC9CEBA33A76F5BBE04EC5B74295D5EDF "
peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [gossip.discovery] Connect -> DEBU 089 Skipping connecting to myself"
peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] LaunchConfig -> DEBU 08a launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]"
peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08b start container: lscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08c start container with args: chaincode -peer.address=peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08d start container with env:
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:2.0.0
peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true
peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt"
peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [container] lockContainer -> DEBU 08e waiting for container(lscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.099 UTC [container] lockContainer -> DEBU 08f got container (lscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.099 UTC [inproccontroller] getInstance -> DEBU 090 chaincode instance created for lscc:2.0.0"
peer0.org2.example.com | "2019-05-02 09:27:22.471 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.47Z grpc.peer_address=172.18.0.6:47148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141µs
peer0.org2.example.com | "2019-05-02 09:27:22.486 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.474Z grpc.peer_address=172.18.0.6:47148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0091ms
peer0.org2.example.com | "2019-05-02 09:27:22.499 UTC [comm.grpc.server] 1 -> INFO 035 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.498Z grpc.peer_address=172.18.0.6:47152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=353.6µs
peer0.org2.example.com | "2019-05-02 09:27:22.606 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.605Z grpc.peer_address=172.18.0.7:51472 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs
peer0.org2.example.com | "2019-05-02 09:27:22.645 UTC [comm.grpc.server] 1 -> INFO 037 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.61Z grpc.peer_address=172.18.0.7:51472 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.0366ms
peer0.org2.example.com | "2019-05-02 09:27:22.652 UTC [comm.grpc.server] 1 -> INFO 038 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.651Z grpc.peer_address=172.18.0.7:51474 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=368.1µs
peer0.org2.example.com | "2019-05-02 09:27:22.814 UTC [gossip.election] beLeader -> INFO 039 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader"
peer0.org2.example.com | "2019-05-02 09:27:22.814 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel"
peer0.org2.example.com | "2019-05-02 09:27:22.828 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:22.838 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations"
peer0.org2.example.com | "2019-05-02 09:27:22.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org2.example.com | "2019-05-02 09:27:22.842 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer0.org2.example.com | "2019-05-02 09:27:22.874 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [1] in 45ms"
peer0.org2.example.com | "2019-05-02 09:27:22.895 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:51474 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=241.6951ms
peer0.org2.example.com | "2019-05-02 09:27:22.897 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=10ms state_commit=8ms)"
peer0.org2.example.com | "2019-05-02 09:27:22.898 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:22.909 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations"
peer0.org2.example.com | "2019-05-02 09:27:22.909 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org2.example.com | "2019-05-02 09:27:22.910 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer0.org2.example.com | "2019-05-02 09:27:22.914 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Anchor peer with same endpoint, skipping connecting to myself"
peer0.org2.example.com | "2019-05-02 09:27:22.948 UTC [committer.txvalidator] Validate -> INFO 047 [businesschannel] Validated block [2] in 49ms"
peer0.org2.example.com | "2019-05-02 09:27:22.988 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [2] with 1 transaction(s) in 37ms (state_validation=2ms block_commit=28ms state_commit=4ms)"
peer0.org2.example.com | "2019-05-02 09:27:23.241 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.24Z grpc.peer_address=172.18.0.5:35766 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119µs
peer0.org2.example.com | "2019-05-02 09:27:23.265 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.248Z grpc.peer_address=172.18.0.5:35766 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9332ms
peer0.org2.example.com | "2019-05-02 09:27:23.271 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.27Z grpc.peer_address=172.18.0.5:35768 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.8µs
peer0.org2.example.com | "2019-05-02 09:27:26.569 UTC [endorser] callChaincode -> INFO 04c [][3bf6ebb7] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:26.571 UTC [endorser] callChaincode -> INFO 04d [][3bf6ebb7] Exit chaincode: name:"_lifecycle" (1ms)"
peer0.org2.example.com | "2019-05-02 09:27:26.571 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59908 grpc.code=OK grpc.call_duration=3.4753ms
peer0.org2.example.com | "2019-05-02 09:27:26.787 UTC [gossip.channel] reportMembershipChanges -> INFO 04f Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]]"
peer0.org2.example.com | "2019-05-02 09:27:29.998 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Received block [3] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:30.049 UTC [committer.txvalidator] Validate -> INFO 051 [businesschannel] Validated block [3] in 51ms"
peer0.org2.example.com | "2019-05-02 09:27:30.068 UTC [confighistory] HandleStateUpdates -> ERRO 052 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0035409a0)}"
peer0.org2.example.com | "2019-05-02 09:27:30.107 UTC [kvledger] CommitWithPvtData -> INFO 053 [businesschannel] Committed block [3] with 1 transaction(s) in 39ms (state_validation=2ms block_commit=27ms state_commit=6ms)"
peer0.org2.example.com | "2019-05-02 09:27:30.270 UTC [endorser] callChaincode -> INFO 054 [][57c125d3] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:30.271 UTC [endorser] callChaincode -> INFO 055 [][57c125d3] Exit chaincode: name:"_lifecycle" (1ms)"
orderer1.example.com | 2019-05-02 09:27:06.067 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0
orderer1.example.com | "2019-05-02 09:27:06.214 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values:
orderer1.example.com | General.LedgerType = "file"
orderer1.example.com | General.ListenAddress = "0.0.0.0"
orderer1.example.com | General.ListenPort = 7050
orderer1.example.com | General.TLS.Enabled = true
orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt"
orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt]
orderer1.example.com | General.TLS.ClientAuthRequired = false
orderer1.example.com | General.TLS.ClientRootCAs = []
orderer1.example.com | General.Cluster.ListenAddress = ""
orderer1.example.com | General.Cluster.ListenPort = 0
orderer1.example.com | General.Cluster.ServerCertificate = ""
orderer1.example.com | General.Cluster.ServerPrivateKey = ""
orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt"
orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer1.example.com | General.Cluster.RootCAs = []
orderer1.example.com | General.Cluster.DialTimeout = 5s
orderer1.example.com | General.Cluster.RPCTimeout = 7s
orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520
orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s
orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s
orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s
orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12
orderer1.example.com | General.Cluster.SendBufferSize = 10
orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s
orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s
orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s
orderer1.example.com | General.Keepalive.ServerTimeout = 20s
orderer1.example.com | General.GenesisMethod = "file"
orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo"
orderer1.example.com | General.SystemChannel = "test-system-channel-name"
orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block"
orderer1.example.com | General.Profile.Enabled = false
orderer1.example.com | General.Profile.Address = "0.0.0.0:6060"
orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp"
orderer1.example.com | General.LocalMSPID = "OrdererMSP"
orderer1.example.com | General.BCCSP.ProviderName = "SW"
orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256
orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2"
orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false
orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore"
orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore =
orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore =
orderer1.example.com | General.BCCSP.PluginOpts =
orderer1.example.com | General.Authentication.TimeWindow = 15m0s
orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer"
orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger"
orderer1.example.com | RAMLedger.HistorySize = 1000
orderer1.example.com | Kafka.Retry.ShortInterval = 5s
orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s
orderer1.example.com | Kafka.Retry.LongInterval = 5m0s
orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s
orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s
orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s
orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s
orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3
orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms
orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3
orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms
orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s
orderer1.example.com | Kafka.Verbose = false
orderer1.example.com | Kafka.Version = 0.10.2.0
orderer1.example.com | Kafka.TLS.Enabled = false
orderer1.example.com | Kafka.TLS.PrivateKey = ""
orderer1.example.com | Kafka.TLS.Certificate = ""
orderer1.example.com | Kafka.TLS.RootCAs = []
orderer1.example.com | Kafka.TLS.ClientAuthRequired = false
orderer1.example.com | Kafka.TLS.ClientRootCAs = []
orderer1.example.com | Kafka.SASLPlain.Enabled = false
orderer1.example.com | Kafka.SASLPlain.User = ""
orderer1.example.com | Kafka.SASLPlain.Password = ""
orderer1.example.com | Kafka.Topic.ReplicationFactor = 3
orderer1.example.com | Debug.BroadcastTraceDir = ""
orderer1.example.com | Debug.DeliverTraceDir = ""
orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal]
orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443"
peer1.org2.example.com | "2019-05-02 09:27:17.048 UTC [endorser] callChaincode -> INFO 02b [][9abb0a6c] Exit chaincode: name:"cscc" (85ms)"
peer1.org2.example.com | "2019-05-02 09:27:17.048 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41164 grpc.code=OK grpc.call_duration=86.6211ms
peer1.org2.example.com | "2019-05-02 09:27:17.983 UTC [endorser] callChaincode -> INFO 02d [][ac14b48a] Entry chaincode: name:"cscc" "
peer1.org2.example.com | "2019-05-02 09:27:17.984 UTC [endorser] callChaincode -> INFO 02e [][ac14b48a] Exit chaincode: name:"cscc" (1ms)"
peer1.org2.example.com | "2019-05-02 09:27:17.984 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41172 grpc.code=OK grpc.call_duration=2.167ms
peer1.org2.example.com | "2019-05-02 09:27:18.967 UTC [endorser] callChaincode -> INFO 030 [][b7b05fb2] Entry chaincode: name:"qscc" "
peer1.org2.example.com | "2019-05-02 09:27:18.969 UTC [endorser] callChaincode -> INFO 031 [][b7b05fb2] Exit chaincode: name:"qscc" (1ms)"
peer1.org2.example.com | "2019-05-02 09:27:18.969 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41180 grpc.code=OK grpc.call_duration=3.0639ms
peer1.org2.example.com | "2019-05-02 09:27:23.045 UTC [gossip.election] beLeader -> INFO 033 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [inproccontroller] func2 -> DEBU 092 chaincode-support started for lscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [inproccontroller] func1 -> DEBU 093 chaincode started for lscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [chaincode] handleMessage -> DEBU 095 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 096 Received REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] Register -> DEBU 097 registered handler complete for chaincode lscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 098 Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED"
peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 099 Changed state to established for name:"lscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] sendReady -> DEBU 09a sending READY for chaincode name:"lscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] sendReady -> DEBU 09b Changed to state ready for chaincode name:"lscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Launch -> DEBU 09c launch complete"
peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Execute -> DEBU 09d Entry"
peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] handleMessage -> DEBU 09e [f4841619] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Notify -> DEBU 09f [f4841619] notifying Txid:f4841619-3456-4681-80e9-bff70932f74d, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:09.105 UTC [chaincode] Execute -> DEBU 0a0 Exit"
peer0.org1.example.com | "2019-05-02 09:27:09.105 UTC [sccapi] deploySysCC -> INFO 0a1 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer0.org1.example.com | "2019-05-02 09:27:09.106 UTC [chaincode] LaunchConfig -> DEBU 0a2 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a3 start container: cscc:2.0.0"
peer0.org2.example.com | "2019-05-02 09:27:30.272 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59928 grpc.code=OK grpc.call_duration=2.9733ms
peer0.org2.example.com | "2019-05-02 09:27:30.447 UTC [endorser] callChaincode -> INFO 057 [businesschannel][fd8294ef] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:30.451 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 058 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'"
peer0.org2.example.com | "2019-05-02 09:27:30.451 UTC [endorser] callChaincode -> INFO 059 [businesschannel][fd8294ef] Exit chaincode: name:"_lifecycle" (3ms)"
peer0.org2.example.com | "2019-05-02 09:27:30.459 UTC [comm.grpc.server] 1 -> INFO 05a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59932 grpc.code=OK grpc.call_duration=13.6998ms
peer0.org2.example.com | "2019-05-02 09:27:32.509 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Received block [4] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:32.521 UTC [committer.txvalidator] Validate -> INFO 05c [businesschannel] Validated block [4] in 9ms"
peer0.org2.example.com | "2019-05-02 09:27:32.527 UTC [confighistory] HandleStateUpdates -> ERRO 05d Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00374a060)}"
peer0.org2.example.com | "2019-05-02 09:27:32.553 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [4] with 1 transaction(s) in 26ms (state_validation=4ms block_commit=12ms state_commit=5ms)"
peer0.org2.example.com | "2019-05-02 09:27:32.562 UTC [comm.grpc.server] 1 -> INFO 05f streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:00.462Z grpc.peer_address=172.18.0.8:59934 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.0997432s
peer0.org2.example.com | "2019-05-02 09:27:33.523 UTC [endorser] callChaincode -> INFO 060 [businesschannel][43825449] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:33.527 UTC [lifecycle] QueryApprovalStatus -> INFO 061 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
peer0.org2.example.com | "2019-05-02 09:27:33.528 UTC [endorser] callChaincode -> INFO 062 [businesschannel][43825449] Exit chaincode: name:"_lifecycle" (5ms)"
peer0.org2.example.com | "2019-05-02 09:27:33.529 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59942 grpc.code=OK grpc.call_duration=7.3406ms
peer0.org2.example.com | "2019-05-02 09:27:34.454 UTC [endorser] callChaincode -> INFO 064 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:34.458 UTC [lifecycle] QueryApprovalStatus -> INFO 065 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
peer0.org2.example.com | "2019-05-02 09:27:34.460 UTC [lifecycle] CommitChaincodeDefinition -> INFO 066 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
peer0.org2.example.com | "2019-05-02 09:27:34.461 UTC [endorser] callChaincode -> INFO 067 [businesschannel][f6f68e79] Exit chaincode: name:"_lifecycle" (7ms)"
peer0.org2.example.com | "2019-05-02 09:27:34.462 UTC [comm.grpc.server] 1 -> INFO 068 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59954 grpc.code=OK grpc.call_duration=9.2268ms
peer0.org2.example.com | "2019-05-02 09:27:36.880 UTC [gossip.privdata] StoreBlock -> INFO 069 [businesschannel] Received block [5] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:36.882 UTC [committer.txvalidator] Validate -> INFO 06a [businesschannel] Validated block [5] in 2ms"
peer0.org2.example.com | "2019-05-02 09:27:36.885 UTC [lifecycle] update -> INFO 06b Updating cached definition for chaincode 'exp02' on channel 'businesschannel'"
peer0.org2.example.com | "2019-05-02 09:27:36.886 UTC [lifecycle] update -> INFO 06c Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0"
peer0.org2.example.com | "2019-05-02 09:27:36.887 UTC [cceventmgmt] HandleStateUpdates -> INFO 06d Channel [businesschannel]: Handling deploy or update of chaincode [exp02]"
peer0.org2.example.com | "2019-05-02 09:27:36.888 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 06e Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory"
peer0.org2.example.com | "2019-05-02 09:27:36.888 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 06f Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement"
peer0.org2.example.com | "2019-05-02 09:27:36.919 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [5] with 1 transaction(s) in 35ms (state_validation=10ms block_commit=14ms state_commit=6ms)"
peer0.org2.example.com | "2019-05-02 09:27:36.928 UTC [comm.grpc.server] 1 -> INFO 071 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:04.466Z grpc.peer_address=172.18.0.8:59956 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4623976s
peer0.org2.example.com | "2019-05-02 09:27:37.694 UTC [endorser] callChaincode -> INFO 072 [businesschannel][efe63c7a] Entry chaincode: name:"_lifecycle" "
peer0.org2.example.com | "2019-05-02 09:27:37.697 UTC [lifecycle] QueryChaincodeDefinition -> INFO 073 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'"
peer0.org2.example.com | "2019-05-02 09:27:37.697 UTC [endorser] callChaincode -> INFO 074 [businesschannel][efe63c7a] Exit chaincode: name:"_lifecycle" (3ms)"
peer0.org2.example.com | "2019-05-02 09:27:37.698 UTC [comm.grpc.server] 1 -> INFO 075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59964 grpc.code=OK grpc.call_duration=4.4357ms
peer0.org2.example.com | "2019-05-02 09:27:41.447 UTC [gossip.privdata] StoreBlock -> INFO 076 [businesschannel] Received block [6] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:41.450 UTC [committer.txvalidator] Validate -> INFO 077 [businesschannel] Validated block [6] in 2ms"
peer0.org2.example.com | "2019-05-02 09:27:41.477 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [6] with 1 transaction(s) in 24ms (state_validation=5ms block_commit=12ms state_commit=3ms)"
peer0.org2.example.com | "2019-05-02 09:27:47.023 UTC [gossip.privdata] StoreBlock -> INFO 079 [businesschannel] Received block [7] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a4 start container with args: chaincode -peer.address=peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a5 start container with env:
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:2.0.0
peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true
peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a6 waiting for container(cscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a7 got container (cscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [inproccontroller] getInstance -> DEBU 0a8 chaincode instance created for cscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] unlockContainer -> DEBU 0a9 container lock deleted(cscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.108 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.108 UTC [container] unlockContainer -> DEBU 0ac container lock deleted(cscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED"
peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.111 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Launch -> DEBU 0b6 launch complete"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0b7 Entry"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [cscc] Init -> INFO 0b8 Init CSCC"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] handleMessage -> DEBU 0b9 [93019833] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Notify -> DEBU 0ba [93019833] notifying Txid:93019833-420f-4a87-a3e6-963973a4d596, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0bb Exit"
peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [sccapi] deploySysCC -> INFO 0bc system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 0bd got container (lscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.115 UTC [container] unlockContainer -> DEBU 0be container lock deleted(lscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] LaunchConfig -> DEBU 0bf launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]"
peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c0 start container: qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c1 start container with args: chaincode -peer.address=peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [chaincode] Start -> DEBU 0c2 start container with env:
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:2.0.0
peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true
peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt"
peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c3 waiting for container(qscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c4 got container (qscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [inproccontroller] getInstance -> DEBU 0c5 chaincode instance created for qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.119 UTC [inproccontroller] func2 -> DEBU 0c6 chaincode-support started for qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [inproccontroller] func1 -> DEBU 0c7 chaincode started for qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0c8 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0c9 Received REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Register -> DEBU 0ca registered handler complete for chaincode qscc:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cb Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cc Changed state to established for name:"qscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0cd sending READY for chaincode name:"qscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0ce Changed to state ready for chaincode name:"qscc:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Launch -> DEBU 0cf launch complete"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d0 Entry"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [qscc] Init -> INFO 0d1 Init QSCC"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0d2 [fd716703] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Notify -> DEBU 0d3 [fd716703] notifying Txid:fd716703-bf83-4d5f-9759-1f3a73295ec2, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d4 Exit"
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [sccapi] deploySysCC -> INFO 0d5 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed"
orderer2.example.com | 2019-05-02 09:27:05.534 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0
peer1.org2.example.com | "2019-05-02 09:27:23.046 UTC [gossip.service] func1 -> INFO 034 Elected as a leader, starting delivery service for channel businesschannel"
peer1.org2.example.com | "2019-05-02 09:27:23.086 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations"
peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer1.org2.example.com | "2019-05-02 09:27:23.144 UTC [committer.txvalidator] Validate -> INFO 039 [businesschannel] Validated block [1] in 57ms"
peer1.org2.example.com | "2019-05-02 09:27:23.189 UTC [kvledger] CommitWithPvtData -> INFO 03a [businesschannel] Committed block [1] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=14ms state_commit=5ms)"
peer1.org2.example.com | "2019-05-02 09:27:23.190 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [2] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:23.219 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations"
peer1.org2.example.com | "2019-05-02 09:27:23.220 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org2.example.com | "2019-05-02 09:27:23.220 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer1.org2.example.com | "2019-05-02 09:27:23.235 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [2] in 44ms"
peer1.org2.example.com | "2019-05-02 09:27:23.257 UTC [gossip.comm] func1 -> WARN 040 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF"
peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 041 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]"
peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 042 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: "
peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Exiting"
peer1.org2.example.com | "2019-05-02 09:27:23.280 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [2] with 1 transaction(s) in 44ms (state_validation=20ms block_commit=16ms state_commit=4ms)"
peer1.org2.example.com | "2019-05-02 09:27:23.885 UTC [comm.grpc.server] 1 -> INFO 045 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.885Z grpc.peer_address=172.18.0.7:37050 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.3µs
peer1.org2.example.com | "2019-05-02 09:27:24.560 UTC [gossip.gossip] validateMsg -> WARN 046 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found"
peer1.org2.example.com | "2019-05-02 09:27:24.560 UTC [gossip.gossip] handleMessage -> WARN 047 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid"
peer1.org2.example.com | "2019-05-02 09:27:27.015 UTC [gossip.channel] reportMembershipChanges -> INFO 048 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]"
peer1.org2.example.com | "2019-05-02 09:27:27.252 UTC [endorser] callChaincode -> INFO 049 [][35ec9214] Entry chaincode: name:"_lifecycle" "
peer1.org2.example.com | "2019-05-02 09:27:27.254 UTC [endorser] callChaincode -> INFO 04a [][35ec9214] Exit chaincode: name:"_lifecycle" (1ms)"
peer1.org2.example.com | "2019-05-02 09:27:27.255 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41240 grpc.code=OK grpc.call_duration=3.1298ms
peer1.org2.example.com | "2019-05-02 09:27:27.823 UTC [gossip.election] stopBeingLeader -> INFO 04c 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader"
peer1.org2.example.com | "2019-05-02 09:27:27.823 UTC [gossip.service] func1 -> INFO 04d Renounced leadership, stopping delivery service for channel businesschannel"
peer1.org2.example.com | "2019-05-02 09:27:27.824 UTC [deliveryClient] try -> WARN 04e Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s"
peer1.org2.example.com | "2019-05-02 09:27:27.827 UTC [blocksProvider] DeliverBlocks -> WARN 04f [businesschannel] Receive error: client is closing"
peer1.org2.example.com | "2019-05-02 09:27:30.007 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Received block [3] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:30.010 UTC [committer.txvalidator] Validate -> INFO 051 [businesschannel] Validated block [3] in 2ms"
peer1.org2.example.com | "2019-05-02 09:27:30.020 UTC [confighistory] HandleStateUpdates -> ERRO 052 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033e8a00)}"
peer1.org2.example.com | "2019-05-02 09:27:30.102 UTC [kvledger] CommitWithPvtData -> INFO 053 [businesschannel] Committed block [3] with 1 transaction(s) in 83ms (state_validation=0ms block_commit=58ms state_commit=11ms)"
peer1.org2.example.com | "2019-05-02 09:27:32.016 UTC [gossip.channel] reportMembershipChanges -> INFO 054 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]"
peer1.org2.example.com | "2019-05-02 09:27:32.516 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [4] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:32.527 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [4] in 11ms"
peer1.org2.example.com | "2019-05-02 09:27:32.581 UTC [gossip.privdata] StoreBlock -> INFO 057 [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (18ms)"
peer0.org2.example.com | "2019-05-02 09:27:47.027 UTC [committer.txvalidator] Validate -> INFO 07a [businesschannel] Validated block [7] in 3ms"
peer0.org2.example.com | "2019-05-02 09:27:47.062 UTC [kvledger] CommitWithPvtData -> INFO 07b [businesschannel] Committed block [7] with 1 transaction(s) in 33ms (state_validation=0ms block_commit=25ms state_commit=4ms)"
peer0.org2.example.com | "2019-05-02 09:27:49.806 UTC [gossip.privdata] StoreBlock -> INFO 07c [businesschannel] Received block [8] from buffer"
peer0.org2.example.com | "2019-05-02 09:27:49.816 UTC [committer.txvalidator] Validate -> INFO 07d [businesschannel] Validated block [8] in 9ms"
peer0.org2.example.com | "2019-05-02 09:27:49.839 UTC [kvledger] CommitWithPvtData -> INFO 07e [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=13ms state_commit=2ms)"
peer0.org2.example.com | "2019-05-02 09:28:04.070 UTC [gossip.privdata] StoreBlock -> INFO 07f [businesschannel] Received block [9] from buffer"
peer0.org2.example.com | "2019-05-02 09:28:04.115 UTC [cauthdsl] deduplicate -> WARN 080 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer0.org2.example.com | "2019-05-02 09:28:04.116 UTC [cauthdsl] deduplicate -> WARN 081 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer0.org2.example.com | "2019-05-02 09:28:04.206 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.196Z grpc.peer_address=172.18.0.5:35936 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=277.8µs
peer0.org2.example.com | "2019-05-02 09:28:04.228 UTC [comm.grpc.server] 1 -> INFO 083 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:35768 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=40.9924319s
peer0.org2.example.com | "2019-05-02 09:28:04.234 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.216Z grpc.peer_address=172.18.0.5:35936 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.5782ms
peer0.org2.example.com | "2019-05-02 09:28:04.274 UTC [comm.grpc.server] 1 -> INFO 085 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.272Z grpc.peer_address=172.18.0.7:51664 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126.6µs
peer0.org2.example.com | "2019-05-02 09:28:04.286 UTC [gossip.gossip] JoinChan -> INFO 086 Joining gossip network of channel businesschannel with 3 organizations"
peer0.org2.example.com | "2019-05-02 09:28:04.290 UTC [gossip.gossip] learnAnchorPeers -> INFO 087 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer0.org2.example.com | "2019-05-02 09:28:04.292 UTC [gossip.gossip] learnAnchorPeers -> INFO 088 Anchor peer with same endpoint, skipping connecting to myself"
peer0.org2.example.com | "2019-05-02 09:28:04.294 UTC [gossip.gossip] learnAnchorPeers -> INFO 089 No configured anchor peers of Org3MSP for channel businesschannel to learn about"
peer0.org2.example.com | "2019-05-02 09:28:04.295 UTC [gossip.gossip] learnAnchorPeers -> INFO 08a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org2.example.com | "2019-05-02 09:28:04.318 UTC [committer.txvalidator] Validate -> INFO 08b [businesschannel] Validated block [9] in 248ms"
peer0.org2.example.com | "2019-05-02 09:28:04.319 UTC [comm.grpc.server] 1 -> INFO 08c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.318Z grpc.peer_address=172.18.0.6:47352 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.7µs
peer0.org2.example.com | "2019-05-02 09:28:04.352 UTC [kvledger] CommitWithPvtData -> INFO 08d [businesschannel] Committed block [9] with 1 transaction(s) in 33ms (state_validation=2ms block_commit=19ms state_commit=6ms)"
peer0.org2.example.com | "2019-05-02 09:28:04.357 UTC [comm.grpc.server] 1 -> INFO 08e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.33Z grpc.peer_address=172.18.0.6:47352 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.6297ms
peer0.org2.example.com | "2019-05-02 09:28:04.356 UTC [comm.grpc.server] 1 -> INFO 08f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:47152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.88781s
peer0.org2.example.com | "2019-05-02 09:28:04.407 UTC [comm.grpc.server] 1 -> INFO 090 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.406Z grpc.peer_address=172.18.0.7:51672 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.2µs
peer0.org2.example.com | "2019-05-02 09:28:04.417 UTC [comm.grpc.server] 1 -> INFO 091 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.28Z grpc.peer_address=172.18.0.7:51664 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=136.8887ms
peer0.org2.example.com | "2019-05-02 09:28:18.574 UTC [endorser] callChaincode -> INFO 092 [][fbe1b497] Entry chaincode: name:"cscc" "
peer0.org2.example.com | "2019-05-02 09:28:18.575 UTC [endorser] callChaincode -> INFO 093 [][fbe1b497] Exit chaincode: name:"cscc" (1ms)"
peer0.org2.example.com | "2019-05-02 09:28:18.576 UTC [comm.grpc.server] 1 -> INFO 094 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:60124 grpc.code=OK grpc.call_duration=2.4152ms
peer0.org2.example.com | "2019-05-02 09:28:19.797 UTC [endorser] callChaincode -> INFO 095 [][0790d864] Entry chaincode: name:"qscc" "
peer0.org2.example.com | "2019-05-02 09:28:19.800 UTC [endorser] callChaincode -> INFO 096 [][0790d864] Exit chaincode: name:"qscc" (2ms)"
peer0.org2.example.com | "2019-05-02 09:28:19.800 UTC [comm.grpc.server] 1 -> INFO 097 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:60132 grpc.code=OK grpc.call_duration=3.55ms
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] LaunchConfig -> DEBU 0d6 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]"
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d7 start container: _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d8 start container with args: chaincode -peer.address=peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d9 start container with env:
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0
peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true
peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt"
peer0.org1.example.com | "2019-05-02 09:27:09.119 UTC [container] unlockContainer -> DEBU 0da container lock deleted(qscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [container] lockContainer -> DEBU 0db waiting for container(qscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0dc got container (qscc:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0dd container lock deleted(qscc:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0de waiting for container(_lifecycle:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0df got container (_lifecycle:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] getInstance -> DEBU 0e0 chaincode instance created for _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e1 container lock deleted(_lifecycle:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e2 waiting for container(_lifecycle:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e3 got container (_lifecycle:2.0.0) lock"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e4 container lock deleted(_lifecycle:2.0.0)"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] func2 -> DEBU 0e5 chaincode-support started for _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] func1 -> DEBU 0e6 chaincode started for _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] handleMessage -> DEBU 0e7 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0e8 Received REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] Register -> DEBU 0e9 registered handler complete for chaincode _lifecycle:2.0.0"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0ea Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED"
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0eb Changed state to established for name:"_lifecycle:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ec sending READY for chaincode name:"_lifecycle:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ed Changed to state ready for chaincode name:"_lifecycle:2.0.0" "
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Launch -> DEBU 0ee launch complete"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0ef Entry"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] handleMessage -> DEBU 0f0 [408a31a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Notify -> DEBU 0f1 [408a31a2] notifying Txid:408a31a2-2689-4f2c-a170-7afbe11d589d, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0f2 Exit"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [sccapi] deploySysCC -> INFO 0f3 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [nodeCmd] serve -> INFO 0f4 Deployed system chaincodes"
peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f5 Returning []"
peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [discovery] NewService -> INFO 0f6 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000"
peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] registerDiscoveryService -> INFO 0f7 Discovery service activated"
peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f8 Starting peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]"
peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f9 Started peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]"
peer0.org1.example.com | "2019-05-02 09:27:09.158 UTC [comm.grpc.server] 1 -> INFO 0fa unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.156Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=359.2µs
peer0.org1.example.com | "2019-05-02 09:27:09.161 UTC [msp.identity] Sign -> DEBU 0fb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:09.162 UTC [msp.identity] Sign -> DEBU 0fc Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:09.162 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fd Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53162"
orderer1.example.com | Operations.TLS.Enabled = false
orderer1.example.com | Operations.TLS.PrivateKey = ""
orderer1.example.com | Operations.TLS.Certificate = ""
orderer1.example.com | Operations.TLS.RootCAs = []
orderer1.example.com | Operations.TLS.ClientAuthRequired = false
orderer1.example.com | Operations.TLS.ClientRootCAs = []
orderer1.example.com | Metrics.Provider = "prometheus"
orderer1.example.com | Metrics.Statsd.Network = "udp"
orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125"
orderer1.example.com | Metrics.Statsd.WriteInterval = 30s
orderer1.example.com | Metrics.Statsd.Prefix = """
orderer1.example.com | "2019-05-02 09:27:06.279 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains"
orderer1.example.com | "2019-05-02 09:27:06.322 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled"
orderer1.example.com | "2019-05-02 09:27:06.322 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050"
orderer1.example.com | "2019-05-02 09:27:06.327 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage"
orderer1.example.com | "2019-05-02 09:27:06.423 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s"
orderer1.example.com | "2019-05-02 09:27:06.423 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft"
orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1,
orderer1.example.com | Endpoint: orderer0.example.com:7050,
orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer2.example.com | "2019-05-02 09:27:05.594 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values:
orderer2.example.com | General.LedgerType = "file"
orderer2.example.com | General.ListenAddress = "0.0.0.0"
orderer2.example.com | General.ListenPort = 7050
orderer2.example.com | General.TLS.Enabled = true
orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt"
orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt]
orderer2.example.com | General.TLS.ClientAuthRequired = false
orderer2.example.com | General.TLS.ClientRootCAs = []
orderer2.example.com | General.Cluster.ListenAddress = ""
orderer2.example.com | General.Cluster.ListenPort = 0
orderer2.example.com | General.Cluster.ServerCertificate = ""
orderer2.example.com | General.Cluster.ServerPrivateKey = ""
orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt"
orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer2.example.com | General.Cluster.RootCAs = []
orderer2.example.com | General.Cluster.DialTimeout = 5s
orderer2.example.com | General.Cluster.RPCTimeout = 7s
orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520
orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s
orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s
orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s
orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12
orderer2.example.com | General.Cluster.SendBufferSize = 10
orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s
orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s
orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s
orderer2.example.com | General.Keepalive.ServerTimeout = 20s
orderer2.example.com | General.GenesisMethod = "file"
orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo"
orderer2.example.com | General.SystemChannel = "test-system-channel-name"
orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block"
orderer2.example.com | General.Profile.Enabled = false
orderer2.example.com | General.Profile.Address = "0.0.0.0:6060"
orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp"
orderer2.example.com | General.LocalMSPID = "OrdererMSP"
orderer2.example.com | General.BCCSP.ProviderName = "SW"
orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256
orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2"
orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false
orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore"
orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore =
orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore =
orderer2.example.com | General.BCCSP.PluginOpts =
orderer2.example.com | General.Authentication.TimeWindow = 15m0s
orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer"
orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger"
peer1.org2.example.com | "2019-05-02 09:27:32.584 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0034daba0)}"
peer1.org2.example.com | "2019-05-02 09:27:32.609 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [4] with 1 transaction(s) in 27ms (state_validation=2ms block_commit=19ms state_commit=3ms)"
peer1.org2.example.com | "2019-05-02 09:27:36.885 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [5] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:36.890 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [5] in 4ms"
peer1.org2.example.com | "2019-05-02 09:27:36.901 UTC [lifecycle] update -> INFO 05c Updating cached definition for chaincode 'exp02' on channel 'businesschannel'"
peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [lifecycle] update -> INFO 05d Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0"
peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [cceventmgmt] HandleStateUpdates -> INFO 05e Channel [businesschannel]: Handling deploy or update of chaincode [exp02]"
peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05f Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory"
peer1.org2.example.com | "2019-05-02 09:27:36.903 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 060 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement"
peer1.org2.example.com | "2019-05-02 09:27:36.931 UTC [kvledger] CommitWithPvtData -> INFO 061 [businesschannel] Committed block [5] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=16ms state_commit=4ms)"
peer1.org2.example.com | "2019-05-02 09:27:41.450 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [6] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:41.453 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [6] in 3ms"
peer1.org2.example.com | "2019-05-02 09:27:41.481 UTC [kvledger] CommitWithPvtData -> INFO 064 [businesschannel] Committed block [6] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=16ms state_commit=5ms)"
peer1.org2.example.com | "2019-05-02 09:27:47.035 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [7] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:47.038 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [7] in 3ms"
peer1.org2.example.com | "2019-05-02 09:27:47.059 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=0ms block_commit=12ms state_commit=3ms)"
peer1.org2.example.com | "2019-05-02 09:27:49.828 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [8] from buffer"
peer1.org2.example.com | "2019-05-02 09:27:49.838 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [8] in 8ms"
peer1.org2.example.com | "2019-05-02 09:27:49.859 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [8] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=15ms state_commit=2ms)"
peer1.org2.example.com | "2019-05-02 09:28:04.085 UTC [gossip.privdata] StoreBlock -> INFO 06b [businesschannel] Received block [9] from buffer"
peer1.org2.example.com | "2019-05-02 09:28:04.087 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer1.org2.example.com | "2019-05-02 09:28:04.088 UTC [cauthdsl] deduplicate -> WARN 06d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] JoinChan -> INFO 06e Joining gossip network of channel businesschannel with 3 organizations"
peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f No configured anchor peers of Org3MSP for channel businesschannel to learn about"
peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer1.org2.example.com | "2019-05-02 09:28:04.136 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer1.org2.example.com | "2019-05-02 09:28:04.136 UTC [gossip.service] updateEndpoints -> WARN 072 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found"
peer1.org2.example.com | "2019-05-02 09:28:04.161 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [9] in 76ms"
peer1.org2.example.com | "2019-05-02 09:28:04.199 UTC [kvledger] CommitWithPvtData -> INFO 074 [businesschannel] Committed block [9] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=26ms state_commit=5ms)"
peer1.org2.example.com | "2019-05-02 09:28:04.437 UTC [comm.grpc.server] 1 -> INFO 075 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:37050 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=40.5856739s
peer1.org2.example.com | "2019-05-02 09:28:04.448 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.447Z grpc.peer_address=172.18.0.7:37228 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=118µs
peer1.org2.example.com | "2019-05-02 09:28:04.519 UTC [gossip.comm] func1 -> WARN 077 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF"
peer1.org2.example.com | "2019-05-02 09:28:04.519 UTC [gossip.discovery] expireDeadMembers -> WARN 078 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]"
peer1.org2.example.com | "2019-05-02 09:28:04.520 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: "
peer1.org2.example.com | "2019-05-02 09:28:04.520 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Exiting"
peer1.org2.example.com | "2019-05-02 09:28:04.557 UTC [comm.grpc.server] 1 -> INFO 07b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.557Z grpc.peer_address=172.18.0.9:40678 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.3µs
peer1.org2.example.com | "2019-05-02 09:28:18.755 UTC [endorser] callChaincode -> INFO 07c [][f175b5d1] Entry chaincode: name:"cscc" "
peer1.org2.example.com | "2019-05-02 09:28:18.757 UTC [endorser] callChaincode -> INFO 07d [][f175b5d1] Exit chaincode: name:"cscc" (2ms)"
peer1.org2.example.com | "2019-05-02 09:28:18.757 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41454 grpc.code=OK grpc.call_duration=3.7607ms
peer1.org2.example.com | "2019-05-02 09:28:19.991 UTC [endorser] callChaincode -> INFO 07f [][6b2b9aca] Entry chaincode: name:"qscc" "
peer1.org2.example.com | "2019-05-02 09:28:19.994 UTC [endorser] callChaincode -> INFO 080 [][6b2b9aca] Exit chaincode: name:"qscc" (2ms)"
peer1.org2.example.com | "2019-05-02 09:28:19.994 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41462 grpc.code=OK grpc.call_duration=3.5867ms
peer0.org1.example.com | "2019-05-02 09:27:09.163 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fe Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53162"
peer0.org1.example.com | "2019-05-02 09:27:09.163 UTC [msp] DeserializeIdentity -> DEBU 0ff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:09.165 UTC [msp.identity] newIdentity -> DEBU 100 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:09.166 UTC [msp] Validate -> DEBU 101 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:09.169 UTC [msp.identity] Verify -> DEBU 102 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:09.170 UTC [msp.identity] Verify -> DEBU 103 Verify: sig = 00000000 30 44 02 20 2f 10 db 70 91 60 35 8b 4e 58 4a e5 |0D. /..p.`5.NXJ.|
peer0.org1.example.com | 00000010 90 69 22 ed 77 7a 7e 5d 36 3b c6 ec b9 31 47 41 |.i".wz~]6;...1GA|
peer0.org1.example.com | 00000020 0f a8 00 41 02 20 13 db 80 56 45 9d 59 80 4c 67 |...A. ...VE.Y.Lg|
peer0.org1.example.com | 00000030 37 52 0e 54 7d b7 70 c5 22 f4 db 8a 54 18 e4 b9 |7R.T}.p."...T...|
peer0.org1.example.com | 00000040 c1 e7 5d fe e7 dd |..]...|"
peer0.org1.example.com | "2019-05-02 09:27:09.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Authenticated 172.18.0.6:53162"
peer0.org1.example.com | "2019-05-02 09:27:09.172 UTC [gossip.comm] GossipStream -> DEBU 105 Servicing 172.18.0.6:53162"
peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [gossip.comm] readFromStream -> DEBU 106 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [gossip.comm] func2 -> DEBU 107 Client 172.18.0.6:53162 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [comm.grpc.server] 1 -> INFO 108 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:19.161Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0584ms
peer0.org1.example.com | "2019-05-02 09:27:09.175 UTC [gossip.comm] writeToStream -> DEBU 109 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:09.177 UTC [grpc] infof -> DEBU 10a transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:09.190 UTC [comm.grpc.server] 1 -> INFO 10b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.19Z grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.7µs
peer0.org1.example.com | "2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:09.193 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10e Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53164"
peer0.org1.example.com | "2019-05-02 09:27:09.194 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53164"
peer0.org1.example.com | "2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 110 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 111 Verify: sig = 00000000 30 45 02 21 00 f4 4d be bf 97 d6 a3 ee c0 c3 d5 |0E.!..M.........|
peer0.org1.example.com | 00000010 26 4d 50 d1 6c 15 49 87 b3 e3 fb f8 2a 4e 9b d2 |&MP.l.I.....*N..|
peer0.org1.example.com | 00000020 2c 29 6e 12 fd 02 20 04 2e 24 e6 ff 7d a8 7d ef |,)n... ..$..}.}.|
peer0.org1.example.com | 00000030 f6 a3 2e f5 f7 88 73 ee c9 03 17 0f ec 5a 20 67 |......s......Z g|
peer0.org1.example.com | 00000040 e2 4e 65 97 86 59 e9 |.Ne..Y.|"
peer0.org1.example.com | "2019-05-02 09:27:09.196 UTC [gossip.comm] authenticateRemotePeer -> DEBU 112 Authenticated 172.18.0.6:53164"
peer0.org1.example.com | "2019-05-02 09:27:09.196 UTC [gossip.comm] GossipStream -> DEBU 113 Servicing 172.18.0.6:53164"
orderer2.example.com | RAMLedger.HistorySize = 1000
orderer2.example.com | Kafka.Retry.ShortInterval = 5s
orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s
orderer2.example.com | Kafka.Retry.LongInterval = 5m0s
orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s
orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s
orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s
orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s
orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3
orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms
orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3
orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms
orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s
orderer2.example.com | Kafka.Verbose = false
orderer2.example.com | Kafka.Version = 0.10.2.0
orderer2.example.com | Kafka.TLS.Enabled = false
orderer2.example.com | Kafka.TLS.PrivateKey = ""
orderer2.example.com | Kafka.TLS.Certificate = ""
orderer2.example.com | Kafka.TLS.RootCAs = []
orderer2.example.com | Kafka.TLS.ClientAuthRequired = false
orderer2.example.com | Kafka.TLS.ClientRootCAs = []
orderer2.example.com | Kafka.SASLPlain.Enabled = false
orderer2.example.com | Kafka.SASLPlain.User = ""
orderer2.example.com | Kafka.SASLPlain.Password = ""
orderer2.example.com | Kafka.Topic.ReplicationFactor = 3
orderer2.example.com | Debug.BroadcastTraceDir = ""
orderer2.example.com | Debug.DeliverTraceDir = ""
orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal]
orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443"
orderer2.example.com | Operations.TLS.Enabled = false
orderer2.example.com | Operations.TLS.PrivateKey = ""
orderer2.example.com | Operations.TLS.Certificate = ""
orderer2.example.com | Operations.TLS.RootCAs = []
orderer2.example.com | Operations.TLS.ClientAuthRequired = false
orderer2.example.com | Operations.TLS.ClientRootCAs = []
orderer2.example.com | Metrics.Provider = "prometheus"
orderer2.example.com | Metrics.Statsd.Network = "udp"
orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125"
orderer2.example.com | Metrics.Statsd.WriteInterval = 30s
orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | ID: 3,
orderer2.example.com | Metrics.Statsd.Prefix = """
orderer2.example.com | "2019-05-02 09:27:05.624 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains"
orderer2.example.com | "2019-05-02 09:27:05.663 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled"
orderer2.example.com | "2019-05-02 09:27:05.664 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050"
orderer2.example.com | "2019-05-02 09:27:05.667 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage"
orderer2.example.com | "2019-05-02 09:27:05.720 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s"
orderer2.example.com | "2019-05-02 09:27:05.721 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft"
orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1,
orderer2.example.com | Endpoint: orderer0.example.com:7050,
orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | ID: 2,
orderer2.example.com | Endpoint: orderer1.example.com:7050,
orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | ]"
orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid"
orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 2 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting"
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.common.server] Start -> INFO 017 Starting orderer:
orderer2.example.com | Version: 2.0.0
orderer2.example.com | Commit SHA: development build
orderer1.example.com | Endpoint: orderer2.example.com:7050,
orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | ]"
orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid"
orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change"
orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid"
orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change"
orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 3 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting"
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.common.server] Start -> INFO 017 Starting orderer:
orderer1.example.com | Version: 2.0.0
orderer1.example.com | Commit SHA: development build
orderer1.example.com | Go version: go1.12.4
orderer1.example.com | OS/Arch: linux/amd64"
orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests"
orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2
peer0.org1.example.com | "2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 114 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:09.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115 Got message: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 116 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 117 Verify: digest = 00000000 c9 f0 7e c3 11 0e 51 a1 50 82 0d 6c 29 57 ab 41 |..~...Q.P..l)W.A|
peer0.org1.example.com | 00000010 27 de 01 d4 b2 04 63 b5 94 ff d0 99 fe 20 4b 6d |'.....c...... Km|"
peer0.org1.example.com | "2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 118 Verify: sig = 00000000 30 44 02 20 03 e4 68 96 38 3b fa 14 de ac 73 11 |0D. ..h.8;....s.|
peer0.org1.example.com | 00000010 ff cb 36 26 cb f1 55 b9 0b 12 a4 f1 d1 cb 36 e8 |..6&..U.......6.|
peer0.org1.example.com | 00000020 20 ff dc 72 02 20 25 6e ac 7a 5c 78 45 fd c6 b8 | ..r. %n.z\xE...|
peer0.org1.example.com | 00000030 94 02 b5 ea da 7f c9 23 2a 48 81 10 a3 2e 75 ec |.......#*H....u.|
peer0.org1.example.com | 00000040 6d 48 39 8f c9 2d |mH9..-|"
peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 45 02 21 00 83 e8 b0 ba d6 d1 78 86 78 ba 69 |0E.!.......x.x.i|
peer0.org1.example.com | 00000010 53 41 10 2a e4 5f b8 d7 9b 5b 30 a8 47 57 82 e0 |SA.*._...[0.GW..|
peer0.org1.example.com | 00000020 b0 67 97 d1 98 02 20 13 35 0e cb 19 d0 b9 de 1e |.g.... .5.......|
peer0.org1.example.com | 00000030 6f 77 81 2d 29 ef b8 9a 24 1f 8c c1 0e 4e 16 09 |ow.-)...$....N..|
peer0.org1.example.com | 00000040 0d 1e 76 0c 8b 3c 55 |..v..<U|"
peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [gossip.discovery] handleAliveMessage -> DEBU 11b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
orderer2.example.com | Go version: go1.12.4
orderer2.example.com | OS/Arch: linux/amd64"
orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests"
orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 022 Failed to send StepRequest to 1, because: rpc error: code = Unavailable desc = all SubConns are in TransientFailure, latest connection error: connection error: desc = "transport: Error while dialing dial tcp 172.18.0.2:7050: connect: connection refused"" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 023 Failed to send StepRequest to 2, because: rpc error: code = Unavailable desc = all SubConns are in TransientFailure, latest connection error: connection error: desc = "transport: Error while dialing dial tcp 172.18.0.4:7050: connect: connection refused"" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] Step -> INFO 024 3 is starting a new election at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 025 3 became pre-candidate at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] poll -> INFO 026 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] campaign -> INFO 028 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.744 UTC [orderer.consensus.etcdraft] send -> INFO 029 Successfully sent StepRequest to 1 after failed attempt(s)" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.744 UTC [orderer.consensus.etcdraft] send -> INFO 02a Successfully sent StepRequest to 2 after failed attempt(s)" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] poll -> INFO 02b 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3
orderer0.example.com | 2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for metrics
orderer0.example.com | 2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for metrics.Statsd
orderer0.example.com | 2019-05-02 09:27:05.877 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: <nil>
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02c 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 02d 3 became candidate at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] poll -> INFO 02e 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] campaign -> INFO 02f 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] campaign -> INFO 030 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.753 UTC [orderer.consensus.etcdraft] poll -> INFO 031 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 032 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 033 3 became leader at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] run -> INFO 034 raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.755 UTC [orderer.consensus.etcdraft] run -> INFO 035 Leader 3 is present, quit campaign" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.755 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 036 Raft leader changed: 0 -> 3" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:07.761 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 037 Start accepting requests as Raft leader at block [0]" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:14.313 UTC [orderer.consensus.etcdraft] propose -> INFO 038 Created block [1], there are 0 blocks in flight" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:14.313 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 039 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:14.324 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03a Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3
orderer2.example.com | "2019-05-02 09:27:14.367 UTC [fsblkstorage] newBlockfileMgr -> INFO 03b Getting block information from block storage"
orderer2.example.com | "2019-05-02 09:27:14.383 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 03c EvictionSuspicion not set, defaulting to 10m0s"
orderer2.example.com | "2019-05-02 09:27:14.385 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 03d No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.commmon.multichannel] newChain -> INFO 03e Created and starting new chain businesschannel"
orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.consensus.etcdraft] Start -> INFO 03f Starting Raft node" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.common.cluster] Configure -> INFO 040 Entering, channel: businesschannel, nodes: [ID: 1,
orderer2.example.com | Endpoint: orderer0.example.com:7050,
orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | ID: 2,
orderer2.example.com | Endpoint: orderer1.example.com:7050,
orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for metrics.Statsd.Prefix setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for metrics.Statsd.Network setting to string udp
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for metrics.Statsd.WriteInterval setting to string 30s
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for metrics.Provider setting to string prometheus
orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[interface{}]interface{} value for consensus
orderer0.example.com | 2019-05-02 09:27:05.880 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.880 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal
orderer0.example.com | 2019-05-02 09:27:05.881 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.881 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot
orderer0.example.com | 2019-05-02 09:27:05.889 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[interface{}]interface{} value for general
orderer0.example.com | 2019-05-02 09:27:05.898 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.Cluster
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.Cluster.ServerPrivateKey setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: 10
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.Cluster.SendBufferSize setting to int 10
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.Cluster.ListenPort setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.Cluster.ListenAddress setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.Cluster.ServerCertificate setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 022 Found map[string]interface{} value for general.Profile
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Profile.Address setting to string 0.0.0.0:6060
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Profile.Enabled setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.LocalMSPID setting to string OrdererMSP
orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 029 Found map[string]interface{} value for general.BCCSP
orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02a Found map[string]interface{} value for general.BCCSP.SW
orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.BCCSP.SW.Hash setting to string SHA2
orderer0.example.com | 2019-05-02 09:27:05.902 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value is not a string: 256
orderer0.example.com | 2019-05-02 09:27:05.904 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.BCCSP.SW.Security setting to int 256
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 02f Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.Default setting to string SW
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a')
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.LedgerType setting to string file
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.ListenAddress setting to string 0.0.0.0
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.GenesisProfile setting to string SampleInsecureSolo
orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.745 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.756 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:07.758 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:14.327 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2
orderer1.example.com | "2019-05-02 09:27:14.374 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage"
orderer1.example.com | "2019-05-02 09:27:14.395 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s"
orderer1.example.com | "2019-05-02 09:27:14.395 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel"
orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1,
orderer1.example.com | Endpoint: orderer0.example.com:7050,
orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer2.example.com | -----END CERTIFICATE-----
orderer2.example.com | ]"
orderer2.example.com | "2019-05-02 09:27:14.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 041 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel"
orderer2.example.com | "2019-05-02 09:27:14.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 042 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change"
orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw
orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4
orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG
orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu
orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C
orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm
orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E
orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw
orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG
orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx
orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | ID: 3,
orderer1.example.com | Endpoint: orderer2.example.com:7050,
orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [gossip.discovery] learnNewMembers -> DEBU 11c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}"
peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11d Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.ListenPort setting to string 7050
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03e Found map[string]interface{} value for general.Authentication
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Authentication.TimeWindow setting to string 15m
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 041 Found map[string]interface{} value for general.TLS
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.TLS.Enabled setting to string true
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key
orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt
orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt]
orderer0.example.com | 2019-05-02 09:27:05.908 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.908 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.TLS.ClientAuthRequired setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.909 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.909 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.TLS.ClientRootCAs setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.910 UTC [viperutil] getKeysRecursively -> DEBU 04e Found map[string]interface{} value for general.Keepalive
orderer0.example.com | 2019-05-02 09:27:05.910 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.914 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Keepalive.ServerMinInterval setting to string 60s
orderer0.example.com | 2019-05-02 09:27:05.915 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.916 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Keepalive.ServerInterval setting to string 7200s
orderer0.example.com | 2019-05-02 09:27:05.919 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Keepalive.ServerTimeout setting to string 20s
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a')
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.GenesisMethod setting to string file
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block
orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 059 Found map[interface{}]interface{} value for fileledger
orderer0.example.com | 2019-05-02 09:27:05.933 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.933 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer
orderer0.example.com | 2019-05-02 09:27:05.934 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value
orderer0.example.com | 2019-05-02 09:27:05.934 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger
orderer0.example.com | 2019-05-02 09:27:05.939 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for ramledger
orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value is not a string: 1000
orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for ramledger.HistorySize setting to int 1000
orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 061 Found map[interface{}]interface{} value for kafka
orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 062 Found map[string]interface{} value for kafka.Topic
orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value is not a string: 3
orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for kafka.Topic.ReplicationFactor setting to int 3
orderer0.example.com | 2019-05-02 09:27:05.942 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.944 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for kafka.Verbose setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for kafka.TLS
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [gossip.discovery] sendMemResponse -> DEBU 121 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 122 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 123 Sign: digest: 294D679F4B8DA423A9752C47753FA557B8520BC698D992FDDE58602EF4E23EDE "
peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:09.206 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:09.208 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:13.092 UTC [gossip.pull] Hello -> DEBU 12a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:13.093 UTC [gossip.comm] Send -> DEBU 12b Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8171991975260542063 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8171991975260542063 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 12e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.pull] HandleMessage -> DEBU 12f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 130 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 131 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 132 Sign: digest: 1D328FAFAE76FEBA6036434DB4200718BB99346BAE4F5605AC555F446D3BCBF6 "
peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 133 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 134 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:13.098 UTC [gossip.comm] Send -> DEBU 135 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] updateStubInMapping -> INFO 043 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel"
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] updateStubInMapping -> INFO 044 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change"
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 045 1 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 046 2 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] Configure -> INFO 047 Exiting"
orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.consensus.etcdraft] start -> INFO 048 Starting raft node as part of a new channel" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 049 3 became follower at term 0" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] newRaft -> INFO 04a newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 04b 3 became follower at term 1" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04c Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04d Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04e Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] Step -> INFO 04f 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] Step -> INFO 050 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 051 3 became follower at term 2" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] Step -> INFO 052 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.518 UTC [orderer.consensus.etcdraft] run -> INFO 053 raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:15.521 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 054 Raft leader changed: 0 -> 1" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:19.580 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 055 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:21.841 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 056 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:29.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 057 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:32.497 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 058 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:36.867 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 059 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:41.419 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05a Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:46.972 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05b Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:27:49.796 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05c Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:28:03.993 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05d Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=3
orderer2.example.com | "2019-05-02 09:28:03.996 UTC [cauthdsl] deduplicate -> WARN 05e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer2.example.com | "2019-05-02 09:28:03.997 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for kafka.TLS.Enabled setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.TLS.PrivateKey setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for kafka.TLS.Certificate setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for kafka.TLS.RootCAs setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.963 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for kafka.SASLPlain
orderer0.example.com | 2019-05-02 09:27:05.964 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.965 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for kafka.SASLPlain.Password setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.965 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.966 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for kafka.SASLPlain.Enabled setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.966 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.967 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.SASLPlain.User setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.967 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.Version setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.Retry
orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.Retry.ShortTotal setting to string 10m
orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.970 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.LongInterval setting to string 5m
orderer0.example.com | 2019-05-02 09:27:05.970 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.974 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.LongTotal setting to string 12h
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s
orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 085 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 086 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 087 Found map[string]interface{} value for kafka.Retry.Metadata
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: 3
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.Metadata.RetryMax setting to int 3
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry.Producer
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3
orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Producer.RetryMax setting to int 3
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.Consumer
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.ShortInterval setting to string 5s
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[interface{}]interface{} value for debug
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for debug.DeliverTraceDir setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for debug.BroadcastTraceDir setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[interface{}]interface{} value for operations
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for operations.ListenAddress setting to string 0.0.0.0:8443
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09e Found map[string]interface{} value for operations.TLS
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09f Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a0 Found real value for operations.TLS.ClientAuthRequired setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a1 Unmarshal JSON: value is not a string: []
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found real value for operations.TLS.ClientRootCAs setting to []interface {} []
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: false
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for operations.TLS.Enabled setting to bool false
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for operations.TLS.Certificate setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value is not a string: <nil>
orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for operations.TLS.PrivateKey setting to <nil> <nil>
orderer0.example.com | 2019-05-02 09:27:05.979 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir:<nil> DeliverTraceDir:<nil>] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:<nil>] Hash:SHA2 Security:256]] Cluster:map[ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key ListenAddress:<nil> ListenPort:<nil> SendBufferSize:10 ServerCertificate:<nil> ServerPrivateKey:<nil>] GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs:<nil> Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password:<nil> User:<nil>] TLS:map[Certificate:<nil> Enabled:false PrivateKey:<nil> RootCAs:<nil>] Topic:map[ReplicationFactor:3] Verbose:false Version:<nil>] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix:<nil> WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate:<nil> ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey:<nil>]] ramledger:map[HistorySize:1000]]
orderer0.example.com | 2019-05-02 09:27:05.980 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0
orderer0.example.com | "2019-05-02 09:27:06.034 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done"
orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer1.example.com | -----END CERTIFICATE-----
orderer1.example.com | ]"
orderer1.example.com | "2019-05-02 09:27:14.450 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting"
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.454 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.454 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.496 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.507 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.510 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.517 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:15.520 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:19.581 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:21.840 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:29.985 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:32.499 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:36.810 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:41.414 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:46.974 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:27:49.799 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 044 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:28:04.002 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 045 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=2
orderer1.example.com | "2019-05-02 09:28:04.005 UTC [cauthdsl] deduplicate -> WARN 046 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer1.example.com | "2019-05-02 09:28:04.006 UTC [cauthdsl] deduplicate -> WARN 047 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | "2019-05-02 09:27:06.051 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]"
orderer0.example.com | "2019-05-02 09:27:06.051 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts"
orderer0.example.com | "2019-05-02 09:27:06.059 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem"
orderer0.example.com | "2019-05-02 09:27:06.080 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts"
orderer0.example.com | "2019-05-02 09:27:06.106 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem"
orderer0.example.com | "2019-05-02 09:27:06.111 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts"
orderer0.example.com | "2019-05-02 09:27:06.120 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem"
orderer0.example.com | "2019-05-02 09:27:06.128 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts"
orderer0.example.com | "2019-05-02 09:27:06.130 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]"
orderer0.example.com | "2019-05-02 09:27:06.130 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts"
orderer0.example.com | "2019-05-02 09:27:06.135 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem"
orderer0.example.com | "2019-05-02 09:27:06.139 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts"
orderer0.example.com | "2019-05-02 09:27:06.141 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]"
orderer0.example.com | "2019-05-02 09:27:06.141 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls"
orderer0.example.com | "2019-05-02 09:27:06.142 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]"
orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]"
orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP"
orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:13.098 UTC [gossip.comm] sendToEndpoint -> DEBU 136 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.099 UTC [gossip.comm] sendToEndpoint -> DEBU 137 Exiting"
orderer0.example.com | "2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.154 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.165 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..."
orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC"
orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.171 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values:
orderer0.example.com | General.LedgerType = "file"
orderer0.example.com | General.ListenAddress = "0.0.0.0"
orderer0.example.com | General.ListenPort = 7050
orderer0.example.com | General.TLS.Enabled = true
orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt"
orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt]
orderer0.example.com | General.TLS.ClientAuthRequired = false
orderer0.example.com | General.TLS.ClientRootCAs = []
orderer0.example.com | General.Cluster.ListenAddress = ""
orderer0.example.com | General.Cluster.ListenPort = 0
orderer0.example.com | General.Cluster.ServerCertificate = ""
orderer0.example.com | General.Cluster.ServerPrivateKey = ""
orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt"
orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key"
orderer0.example.com | General.Cluster.RootCAs = []
orderer0.example.com | General.Cluster.DialTimeout = 5s
orderer0.example.com | General.Cluster.RPCTimeout = 7s
orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520
orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s
orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s
orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s
orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12
orderer0.example.com | General.Cluster.SendBufferSize = 10
orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s
orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s
orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s
orderer0.example.com | General.Keepalive.ServerTimeout = 20s
orderer0.example.com | General.GenesisMethod = "file"
orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo"
orderer0.example.com | General.SystemChannel = "test-system-channel-name"
orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block"
orderer0.example.com | General.Profile.Enabled = false
orderer0.example.com | General.Profile.Address = "0.0.0.0:6060"
orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp"
orderer0.example.com | General.LocalMSPID = "OrdererMSP"
orderer0.example.com | General.BCCSP.ProviderName = "SW"
orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256
orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2"
orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false
orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore"
orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore =
orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore =
orderer0.example.com | General.BCCSP.PluginOpts =
orderer0.example.com | General.Authentication.TimeWindow = 15m0s
orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer"
orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger"
orderer0.example.com | RAMLedger.HistorySize = 1000
orderer0.example.com | Kafka.Retry.ShortInterval = 5s
orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s
orderer0.example.com | Kafka.Retry.LongInterval = 5m0s
orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s
orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s
orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s
orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s
orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3
orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms
orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3
peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 138 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 139 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 1d 32 8f af ae 76 fe ba 60 36 43 4d b4 20 07 18 |.2...v..`6CM. ..|
peer0.org1.example.com | 00000010 bb 99 34 6b ae 4f 56 05 ac 55 5f 44 6d 3b cb f6 |..4k.OV..U_Dm;..|"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 45 02 21 00 c0 a4 06 5c 49 75 2a 3f 49 23 0e |0E.!....\Iu*?I#.|
peer0.org1.example.com | 00000010 f3 1c 69 28 e7 98 dc b7 28 1c f2 3c f5 26 f9 1b |..i(....(..<.&..|
peer0.org1.example.com | 00000020 00 78 c5 e5 89 02 20 50 03 2c bd 98 41 09 0f 9d |.x.... P.,..A...|
peer0.org1.example.com | 00000030 2f 8b 36 18 40 57 1d 45 23 0f ad 35 9f 8e 53 61 |/.6.@W.E#..5..Sa|
peer0.org1.example.com | 00000040 87 4e 3e eb 57 d8 94 |.N>.W..|"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 5e 66 33 ce 48 06 7b e0 5e 34 05 79 |0D. ^f3.H.{.^4.y|
peer0.org1.example.com | 00000010 8f ab 5f 83 0f bd 42 0f bc 0d 84 94 a7 7b c2 8e |.._...B......{..|
peer0.org1.example.com | 00000020 94 70 cd 8f 02 20 58 39 3d a6 8b a9 ff c7 f1 9a |.p... X9=.......|
peer0.org1.example.com | 00000030 3d ad 67 70 3c 0d c1 59 b1 f2 f3 a8 f4 88 3f d1 |=.gp<..Y......?.|
peer0.org1.example.com | 00000040 bc 1c 17 25 af 47 |...%.G|"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] isSentByMe -> DEBU 140 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 141 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 142 Verify: digest = 00000000 f2 9f d6 4e 51 d8 70 03 8b cc ce 6d 34 37 3e 54 |...NQ.p....m47>T|
peer0.org1.example.com | 00000010 5b 9e 4c b0 f2 73 5e 0c 82 03 26 96 7d a1 22 cf |[.L..s^...&.}.".|"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 143 Verify: sig = 00000000 30 44 02 20 4b 9f 93 fc 8c 14 0f a1 28 76 bd 93 |0D. K.......(v..|
peer0.org1.example.com | 00000010 ea 2a a9 58 fb 5a d5 52 3d d8 49 7f fe de 6b 58 |.*.X.Z.R=.I...kX|
peer0.org1.example.com | 00000020 5e f9 14 9c 02 20 5a 54 97 83 c5 8f 84 2b e7 9c |^.... ZT.....+..|
peer0.org1.example.com | 00000030 c9 d4 31 36 8b 35 55 11 33 0a f4 62 2e 7f 44 80 |..16.5U.3..b..D.|
peer0.org1.example.com | 00000040 62 ad d8 07 51 10 |b...Q.|"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 144 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 145 Verify: sig = 00000000 30 44 02 20 71 a4 01 5f 21 3c f0 31 f8 c0 ae 0b |0D. q.._!<.1....|
peer0.org1.example.com | 00000010 ce e6 75 07 f0 c6 e4 e4 40 47 67 1a 0d 85 b1 0e |..u.....@Gg.....|
peer0.org1.example.com | 00000020 1f 7d 2b a7 02 20 69 67 89 56 35 11 a5 81 1c 5c |.}+.. ig.V5....\|
peer0.org1.example.com | 00000030 10 5b 6d 56 2f f4 b3 de e5 7e 17 7c e3 db 2d ba |.[mV/....~.|..-.|
peer0.org1.example.com | 00000040 66 e4 a1 bf 30 9d |f...0.|"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 146 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms
orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s
orderer0.example.com | Kafka.Verbose = false
orderer0.example.com | Kafka.Version = 0.10.2.0
orderer0.example.com | Kafka.TLS.Enabled = false
orderer0.example.com | Kafka.TLS.PrivateKey = ""
orderer0.example.com | Kafka.TLS.Certificate = ""
orderer0.example.com | Kafka.TLS.RootCAs = []
orderer0.example.com | Kafka.TLS.ClientAuthRequired = false
orderer0.example.com | Kafka.TLS.ClientRootCAs = []
orderer0.example.com | Kafka.SASLPlain.Enabled = false
orderer0.example.com | Kafka.SASLPlain.User = ""
orderer0.example.com | Kafka.SASLPlain.Password = ""
orderer0.example.com | Kafka.Topic.ReplicationFactor = 3
orderer0.example.com | Debug.BroadcastTraceDir = ""
orderer0.example.com | Debug.DeliverTraceDir = ""
orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal]
orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443"
orderer0.example.com | Operations.TLS.Enabled = false
orderer0.example.com | Operations.TLS.PrivateKey = ""
orderer0.example.com | Operations.TLS.Certificate = ""
orderer0.example.com | Operations.TLS.RootCAs = []
orderer0.example.com | Operations.TLS.ClientAuthRequired = false
orderer0.example.com | Operations.TLS.ClientRootCAs = []
orderer0.example.com | Metrics.Provider = "prometheus"
orderer0.example.com | Metrics.Statsd.Network = "udp"
orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125"
orderer0.example.com | Metrics.Statsd.WriteInterval = 30s
orderer0.example.com | Metrics.Statsd.Prefix = """
orderer0.example.com | "2019-05-02 09:27:06.188 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.189 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.192 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP"
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 147 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 148 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 "
peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 149 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 "
peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 14c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 14e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:17703106220587596212 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.pull] HandleMessage -> DEBU 14f GossipMessage: tag:EMPTY hello:<nonce:17703106220587596212 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.pull] SendDigest -> DEBU 150 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 151 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 152 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10e Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 10f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 110 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 111 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Policy] /Channel/Consortiums/Admins"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:06.205 UTC [orderer.common.server] createLedgerFactory -> DEBU 13a Ledger dir: /var/hyperledger/production/orderer"
orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] CreateDirIfMissing -> DEBU 13b CreateDirIfMissing [/var/hyperledger/production/orderer/index/]"
orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13c Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist"
orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13d After creating dir - [/var/hyperledger/production/orderer/index/] exists"
orderer0.example.com | "2019-05-02 09:27:06.231 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 13e Bootstrapping because no existing chains"
orderer0.example.com | "2019-05-02 09:27:06.232 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 13f Selected bootstrap block, because system channel last config block is nil"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 146 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 147 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 149 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14b Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14c Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14d Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14f Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.236 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.237 UTC [common.channelconfig] validateMSP -> DEBU 151 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] newBccspMsp -> DEBU 152 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] New -> DEBU 153 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] Setup -> DEBU 154 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 155 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 156 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] Validate -> DEBU 157 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 158 Initializing protos for *channelconfig.ConsortiumProtos"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] validateMSP -> DEBU 15c Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] newBccspMsp -> DEBU 15d Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] New -> DEBU 15e Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] Setup -> DEBU 15f Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 160 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 161 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 162 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.259 UTC [msp] Validate -> DEBU 163 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 164 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] hasOURole -> DEBU 165 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 166 MSP Org1MSP getting certification chain"
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] NewStandardValues -> DEBU 167 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: MSP"
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] validateMSP -> DEBU 169 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] newBccspMsp -> DEBU 16a Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] New -> DEBU 16b Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] Setup -> DEBU 16c Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16f Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] Validate -> DEBU 170 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] getCertificationChain -> DEBU 171 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.266 UTC [msp] hasOURole -> DEBU 172 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.270 UTC [msp] getCertificationChain -> DEBU 173 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 174 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 175 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:06.271 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.273 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.275 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Admins for Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 186 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 188 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 153 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU 154 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 155 Verify: digest = 00000000 4f 61 18 9a 46 50 55 1f 38 af 18 76 5f 38 f5 78 |Oa..FPU.8..v_8.x|
peer0.org1.example.com | 00000010 eb b8 ab 55 16 51 25 db b9 14 fe db 42 d0 c8 c9 |...U.Q%.....B...|"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 156 Verify: sig = 00000000 30 44 02 20 0a c2 bb 53 a0 6e 65 aa cc da 79 c4 |0D. ...S.ne...y.|
peer0.org1.example.com | 00000010 1e 77 55 82 bd 1f 4c 33 01 29 c3 42 ee a9 45 f5 |.wU...L3.).B..E.|
peer0.org1.example.com | 00000020 d9 99 72 9c 02 20 1c 85 a4 5c af 94 66 a5 95 b8 |..r.. ...\..f...|
peer0.org1.example.com | 00000030 19 2b 24 f1 13 66 98 dd d3 87 74 cb 3e 5b c5 f1 |.+$..f....t.>[..|
peer0.org1.example.com | 00000040 48 b4 9b 10 c4 dd |H.....|"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 45 02 21 00 d7 82 7f 5d c0 1e 8d 93 95 50 45 |0E.!....].....PE|
peer0.org1.example.com | 00000010 4a 09 a7 2b 4b 3b ba 73 98 09 78 78 37 36 c2 86 |J..+K;.s..xx76..|
peer0.org1.example.com | 00000020 b9 0a af 95 2d 02 20 50 4b dc c2 36 24 eb 50 7d |....-. PK..6$.P}|
peer0.org1.example.com | 00000030 7d d2 36 23 48 71 f0 8a 02 ad 47 a1 f6 25 00 7a |}.6#Hq....G..%.z|
peer0.org1.example.com | 00000040 79 98 36 30 e9 eb 1c |y.60...|"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] handleAliveMessage -> DEBU 159 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 "
peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Consortiums/Admins"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:06.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b2 Obtaining default signing identity"
orderer0.example.com | "2019-05-02 09:27:06.295 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b3 Booted with a genesis block, replication isn't an option"
orderer0.example.com | "2019-05-02 09:27:06.312 UTC [orderer.common.server] initializeServerConfig -> INFO 1b4 Starting orderer with TLS enabled"
orderer0.example.com | "2019-05-02 09:27:06.313 UTC [orderer.common.server] configureClusterListener -> INFO 1b5 Cluster listener is not configured, defaulting to use the general listener on port 7050"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b6 newBlockfileMgr() initializing file-based block storage for ledger: testchainid "
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b7 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b8 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b9 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ba Getting block information from block storage"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bb Retrieving checkpoint info from block files"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bc retrieveLastFileSuffix()"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bd retrieveLastFileSuffix() - biggestFileNum = -1"
orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1be Last file number found = -1"
orderer0.example.com | "2019-05-02 09:27:06.317 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bf No block file found"
orderer0.example.com | "2019-05-02 09:27:06.317 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003f28a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])"
orderer0.example.com | "2019-05-02 09:27:06.322 UTC [fsblkstorage] newBlockIndex -> DEBU 1c1 newBlockIndex() - indexItems:[[BlockNum]]"
orderer0.example.com | "2019-05-02 09:27:06.327 UTC [fsblkstorage] indexBlock -> DEBU 1c2 Indexing block [blockNum=0, blockHash=[]byte{0x90, 0xf3, 0x5b, 0xf6, 0x65, 0xcc, 0xb0, 0x39, 0x2, 0xab, 0x1f, 0x8, 0xbd, 0x90, 0x1c, 0xde, 0x6b, 0xcd, 0x74, 0xd9, 0xda, 0x8f, 0xbb, 0xba, 0xde, 0x4c, 0x4b, 0x31, 0xcd, 0x28, 0x3, 0x78} txOffsets=
orderer0.example.com | txId=10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1 locPointer=offset=39, bytesLength=18371
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:06.331 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8 Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] validateMSP -> DEBU 1d5 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] newBccspMsp -> DEBU 1d6 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] New -> DEBU 1d7 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] Setup -> DEBU 1d8 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1d9 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1da Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp] Validate -> DEBU 1db MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.ConsortiumProtos"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [common.channelconfig] validateMSP -> DEBU 1e0 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] newBccspMsp -> DEBU 1e1 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] New -> DEBU 1e2 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] Setup -> DEBU 1e3 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e5 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e6 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] Validate -> DEBU 1e7 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] hasOURole -> DEBU 1e9 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1ea MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] NewStandardValues -> DEBU 1eb Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ec Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] validateMSP -> DEBU 1ed Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] newBccspMsp -> DEBU 1ee Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] New -> DEBU 1ef Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] Setup -> DEBU 1f0 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp.identity] newIdentity -> DEBU 1f1 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 "
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 15f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 160 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] sendMemResponse -> DEBU 161 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 162 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 163 Sign: digest: 72A9295ADCC55E1ADAF8686ABEC8A9762EEF9ABBF0F0BF0809368B567368C629 "
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 164 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 165 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.comm] Send -> DEBU 166 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 167 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 168 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.discovery] sendMemResponse -> DEBU 169 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:14.059 UTC [msp.identity] Sign -> DEBU 16a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:14.060 UTC [msp.identity] Sign -> DEBU 16b Sign: digest: 89C366B5701489D679D2777974B03C747D0B532CCABE350CD605CEEE397A95D8 "
peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16e Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.pull] SendReq -> DEBU 16f Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.066 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.066 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.|
peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|"
peer0.org1.example.com | "2019-05-02 09:27:14.067 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 44 02 20 47 67 e7 6b 08 b7 e8 66 20 94 39 a3 |0D. Gg.k...f .9.|
peer0.org1.example.com | 00000010 f4 f9 e3 c7 9e 9a 6f 94 6b 49 25 8e 5c 91 a8 c1 |......o.kI%.\...|
peer0.org1.example.com | 00000020 86 69 ca b6 02 20 56 6e 45 f4 4e 9a a8 e1 b1 a7 |.i... VnE.N.....|
peer0.org1.example.com | 00000030 a5 73 b7 d1 a6 5f 6d 59 d4 9a a5 ef 5b 6a 60 e1 |.s..._mY....[j`.|
peer0.org1.example.com | 00000040 15 38 16 55 9a ef |.8.U..|"
peer0.org1.example.com | "2019-05-02 09:27:14.067 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes"
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f3 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] Validate -> DEBU 1f4 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] hasOURole -> DEBU 1f6 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f7 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f8 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f9 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Admins for Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20b Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20d Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20e Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:14.068 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]"
peer0.org1.example.com | "2019-05-02 09:27:14.068 UTC [gossip.pull] HandleMessage -> DEBU 178 Added <20><><0F><><EFBFBD>l<EFBFBD>J<EFBFBD>m[|<7C><><EFBFBD>>}<7D><><EFBFBD>Adӊz<D38A>Q2b<32> to the in memory item map, total items: 2"
peer0.org1.example.com | "2019-05-02 09:27:14.069 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.070 UTC [gossip.comm] Send -> DEBU 17a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.112 UTC [gossip.gossip] handleMessage -> DEBU 17d Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.112 UTC [gossip.pull] HandleMessage -> DEBU 17e GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.113 UTC [gossip.gossip] handleMessage -> DEBU 17f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.113 UTC [gossip.pull] SendRes -> DEBU 180 Sending 1 IDENTITY_MSG items to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:14.114 UTC [gossip.gossip] handleMessage -> DEBU 181 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Consortiums/Admins"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Policy] /Channel/Writers"
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.115 UTC [gossip.gossip] handleMessage -> DEBU 182 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.115 UTC [gossip.discovery] handleMsgFromComm -> DEBU 183 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 184 Verify: digest = 00000000 98 97 02 8b 69 77 28 e9 ad bb 36 09 85 63 3b 96 |....iw(...6..c;.|
peer0.org1.example.com | 00000010 ae d1 54 0d e4 9e 03 e8 9e cb c4 70 61 db a5 f4 |..T........pa...|"
peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 185 Verify: sig = 00000000 30 45 02 21 00 cb 78 f9 34 bb 57 41 89 ec a0 c1 |0E.!..x.4.WA....|
peer0.org1.example.com | 00000010 67 af c4 27 e9 34 0c 85 b2 cf a8 39 88 a5 4b 7b |g..'.4.....9..K{|
peer0.org1.example.com | 00000020 80 27 ad 21 da 02 20 47 8e 9f bf 19 b7 0b 94 5e |.'.!.. G.......^|
peer0.org1.example.com | 00000030 a2 d6 55 ac 59 0c ef db 53 07 3e 15 19 b2 6d 1b |..U.Y...S.>...m.|
peer0.org1.example.com | 00000040 cd 74 d4 8d 5b ab d1 |.t..[..|"
peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 186 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 187 Verify: sig = 00000000 30 44 02 20 4f 0c 0a f4 94 25 f3 90 b4 7a dc 2e |0D. O....%...z..|
peer0.org1.example.com | 00000010 9f 53 fb ae 8e 66 fd 3c 02 2c 2d d9 91 05 0c cf |.S...f.<.,-.....|
peer0.org1.example.com | 00000020 77 3a f9 5c 02 20 41 5f 73 66 aa 59 93 99 ac 7e |w:.\. A_sf.Y...~|
peer0.org1.example.com | 00000030 82 0e 4e 8c 06 54 fc f4 dc 80 09 92 c4 31 eb 9c |..N..T.......1..|
peer0.org1.example.com | 00000040 73 c7 3d 39 ba 8f |s.=9..|"
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 188 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 "
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 "
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | "2019-05-02 09:27:06.352 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[18415], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] Next -> DEBU 23b Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 23c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d Remaining bytes=[18415], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23e Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23f blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium"
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:14.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [endorser] ProcessProposal -> DEBU 190 Entering: request from 172.18.0.8:57196"
peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [protoutils] ValidateProposalMessage -> DEBU 191 ValidateProposalMessage starts for signed proposal 0xc0023f2e60"
peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [protoutils] validateChannelHeader -> DEBU 192 validateChannelHeader info: header type 1"
peer0.org1.example.com | "2019-05-02 09:27:16.161 UTC [protoutils] checkSignatureFromCreator -> DEBU 193 begin"
peer0.org1.example.com | "2019-05-02 09:27:16.161 UTC [msp] DeserializeIdentity -> DEBU 194 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:16.162 UTC [msp.identity] newIdentity -> DEBU 195 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.162 UTC [protoutils] checkSignatureFromCreator -> DEBU 196 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp] Validate -> DEBU 197 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 199 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....|
peer0.org1.example.com | 00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|"
peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 19a Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v|
peer0.org1.example.com | 00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.|
peer0.org1.example.com | 00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..|
peer0.org1.example.com | 00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h|
peer0.org1.example.com | 00000040 2b e7 48 0c fc 0f |+.H...|"
peer0.org1.example.com | "2019-05-02 09:27:16.164 UTC [protoutils] checkSignatureFromCreator -> DEBU 19b exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:16.164 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19c validateChaincodeProposalMessage starts for proposal 0xc0024b6690, header 0xc0023f3770"
peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] preProcess -> DEBU 19e [][dbf7024a] processing txid: dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84"
peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] SimulateProposal -> DEBU 19f [][dbf7024a] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] callChaincode -> INFO 1a0 [][dbf7024a] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:16.166 UTC [chaincode] Execute -> DEBU 1a1 Entry"
peer0.org1.example.com | "2019-05-02 09:27:16.166 UTC [cscc] Invoke -> DEBU 1a2 Invoke function: JoinChain"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] NewStandardValues -> DEBU 1a3 Initializing protos for *channelconfig.ChannelProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a4 Processing field: HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a5 Processing field: BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a6 Processing field: OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a7 Processing field: Consortium"
peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a8 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] NewStandardValues -> DEBU 1a9 Initializing protos for *channelconfig.OrdererProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1aa Processing field: ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ab Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ac Processing field: BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ad Processing field: KafkaBrokers"
peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ae Processing field: ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:16.169 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1af Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b0 Initializing protos for *channelconfig.OrdererOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b1 Processing field: Endpoints"
peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b2 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b3 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [common.channelconfig] validateMSP -> DEBU 1b4 Setting up MSP for org OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] newBccspMsp -> DEBU 1b5 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] New -> DEBU 1b6 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] Setup -> DEBU 1b7 Setting up MSP instance OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:16.172 UTC [msp.identity] newIdentity -> DEBU 1b8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] Setup -> DEBU 254 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 256 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [msp] Validate -> DEBU 257 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ConsortiumProtos"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] validateMSP -> DEBU 25c Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.363 UTC [msp] newBccspMsp -> DEBU 25d Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp] New -> DEBU 25e Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp] Setup -> DEBU 25f Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 260 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 262 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] Validate -> DEBU 263 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 264 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] hasOURole -> DEBU 265 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 266 MSP Org2MSP getting certification chain"
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.173 UTC [msp.identity] newIdentity -> DEBU 1b9 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.174 UTC [msp] Validate -> DEBU 1ba MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] NewStandardValues -> DEBU 1bb Initializing protos for *channelconfig.ApplicationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bc Processing field: ACLs"
peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bd Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1be Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bf Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1c0 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c1 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] Validate -> DEBU 1c2 Anchor peers for org Org1MSP are "
peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] validateMSP -> DEBU 1c3 Setting up MSP for org Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [msp] newBccspMsp -> DEBU 1c4 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [msp] New -> DEBU 1c5 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.178 UTC [msp] Setup -> DEBU 1c6 Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.178 UTC [msp.identity] newIdentity -> DEBU 1c7 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.179 UTC [msp.identity] newIdentity -> DEBU 1c8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c9 Checking if identity satisfies role [CLIENT] for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] Validate -> DEBU 1ca MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] getCertificationChain -> DEBU 1cb MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [msp] hasOURole -> DEBU 1cc MSP Org1MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [msp] getCertificationChain -> DEBU 1cd MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [common.channelconfig] NewStandardValues -> DEBU 1ce Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] NewStandardValues -> DEBU 1d0 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] Validate -> DEBU 1d2 Anchor peers for org Org2MSP are "
peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.185 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] validateMSP -> DEBU 269 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] newBccspMsp -> DEBU 26a Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] New -> DEBU 26b Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp] Setup -> DEBU 26c Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26f Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Validate -> DEBU 270 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 271 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] hasOURole -> DEBU 272 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 273 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 274 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 275 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 287 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 289 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Consortiums/Admins"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b2 As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b3 As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b4 Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b5 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b7 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b8 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b9 Manager Channel has managers Consortiums"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2ba Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2bb Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2bd Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2be Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [orderer.common.server] func1 -> DEBU 2bf Executing callback to update root CAs"
orderer0.example.com | "2019-05-02 09:27:06.377 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 updating root CAs for channel [testchainid]"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c2 adding orderer root CAs for MSP [OrdererMSP]"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c3 adding app root CAs for MSP [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] Next -> DEBU 2c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Remaining bytes=[18415], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c8 blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c9 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)"
orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2ca EvictionSuspicion not set, defaulting to 10m0s"
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d9 Checking if identity satisfies role [CLIENT] for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] Validate -> DEBU 1da MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] getCertificationChain -> DEBU 1db MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] hasOURole -> DEBU 1dc MSP Org2MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] getCertificationChain -> DEBU 1dd MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1de Setting up the MSP manager (3 msps)"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1df MSP manager setup complete, setup 3 msps"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e0 Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e1 Application capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e2 Checking if identity satisfies ADMIN role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e3 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....|
peer0.org1.example.com | 00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|"
peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e4 Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v|
peer0.org1.example.com | 00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.|
peer0.org1.example.com | 00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..|
peer0.org1.example.com | 00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h|
peer0.org1.example.com | 00000040 2b e7 48 0c fc 0f |+.H...|"
peer0.org1.example.com | "2019-05-02 09:27:16.191 UTC [ledgermgmt] CreateLedger -> INFO 1e5 Creating ledger [businesschannel] with genesis block"
peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e6 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel "
peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1e7 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]"
peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e8 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e9 After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists"
peer0.org1.example.com | "2019-05-02 09:27:16.196 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ea Getting block information from block storage"
peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1eb Retrieving checkpoint info from block files"
peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ec retrieveLastFileSuffix()"
peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ed retrieveLastFileSuffix() - biggestFileNum = -1"
peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ee Last file number found = -1"
peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ef No block file found"
peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1f0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0025cc7c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])"
peer0.org1.example.com | "2019-05-02 09:27:16.202 UTC [fsblkstorage] newBlockIndex -> DEBU 1f1 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]"
peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] OpenStore -> DEBU 1f2 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]"
peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f3 Starting to process collection eligibility events"
peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [leveldbhelper] GetIterator -> DEBU 1f4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]"
peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f5 Converted [0] inelligible mising data entries to elligible"
peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [pvtdatastorage] func1 -> DEBU 1f6 Waiting for collection eligibility event"
peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [leveldbhelper] GetIterator -> DEBU 1f7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]"
peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f8 Creating KVLedger ledgerID=businesschannel: "
peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f9 Register state db for chaincode lifecycle events: false"
peer0.org1.example.com | "2019-05-02 09:27:16.205 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fa constructing new query executor txid = []"
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [leveldbhelper] GetIterator -> DEBU 1fb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]"
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] Done -> DEBU 1fc Done with transaction simulation / query execution []"
orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cb No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2cc No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.396 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cd Loading WAL at Term 0 and Index 0" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ce Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cf Appending 0 entries to memory storage" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] Next -> DEBU 2d0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 Remaining bytes=[18415], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d3 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d4 blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d5 [channel: testchainid] Done creating channel support resources"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d6 Creating system channel msg processor for channel testchainid"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] Next -> DEBU 2d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 Remaining bytes=[18415], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2da Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2db blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.commmon.multichannel] Initialize -> INFO 2dc Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.consensus.etcdraft] Start -> INFO 2dd Starting Raft node" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] Configure -> INFO 2de Entering, channel: testchainid, nodes: [ID: 2,
orderer0.example.com | Endpoint: orderer1.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | ID: 3,
orderer0.example.com | Endpoint: orderer2.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2df Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e0 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change"
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [kvledger] recoverDBs -> DEBU 1fd Entering recoverDB()"
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1fe Block storage is empty."
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ff Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 200 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database"
peer0.org1.example.com | "2019-05-02 09:27:16.207 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 201 Constructing unique pvtData by removing duplicate entries"
peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [kvledger] CommitWithPvtData -> DEBU 202 [businesschannel] Validating state for block [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 203 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 204 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 205 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 ValidateAndPrepareBatch() for block number = [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] preprocessProtoBlock -> DEBU 208 txType=CONFIG"
peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 209 Performing custom processing for transaction [txid=], [txType=CONFIG]"
peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 20a Processor for custom tx processing:&peer.configtxProcessor{}"
peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 20b constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 20c constructing new tx simulator txid = []"
peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [peer] GenerateSimulationResults -> DEBU 20d Processing CONFIG"
orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] func1 -> DEBU 2e1 Connecting to ID: 2,
orderer0.example.com | Endpoint: orderer1.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | for channel testchainid"
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e2 parsed scheme: """
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e3 scheme "" not registered, fallback to default scheme"
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] UpdateState -> DEBU 2e4 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 <nil>}] }"
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] switchBalancer -> DEBU 2e5 ClientConn switching balancer to "pick_first""
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid"
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change"
orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] func1 -> DEBU 2e8 Connecting to ID: 3,
orderer0.example.com | Endpoint: orderer2.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | for channel testchainid"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2e9 parsed scheme: """
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2ea scheme "" not registered, fallback to default scheme"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] UpdateState -> DEBU 2eb ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 <nil>}] }"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] switchBalancer -> DEBU 2ec ClientConn switching balancer to "pick_first""
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ed 2 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 3 exists in both old and new membership for channel testchainid , skipping its deactivation"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] Configure -> INFO 2ef Exiting"
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, CONNECTING"
orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.consensus.etcdraft] start -> DEBU 2f1 Starting raft node: #peers: 3" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] start -> INFO 2f2 Starting raft node as part of a new channel" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f3 1 became follower at term 0" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f4 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f5 1 became follower at term 1" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f6 Starting orderer:
orderer0.example.com | Version: 2.0.0
orderer0.example.com | Commit SHA: development build
orderer0.example.com | Go version: go1.12.4
orderer0.example.com | OS/Arch: linux/amd64"
orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f7 Beginning to serve requests"
peer0.org1.example.com | "2019-05-02 09:27:16.216 UTC [peer] processChannelConfigTx -> DEBU 20e channelConfig=sequence:1 channel_group:<groups:<key:"Application" value:<version:1 groups:<key:"Org1MSP" value:<values:<key:"MSP" value:<value:"\022\363!\n\007Org1MSP\022\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\nZ\332\r\010\001\022\352\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\006client\032\350\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Org2MSP" value:<values:<key:"MSP" value:<value:"\022\377!\n\007Org2MSP\022\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\nZ\342\r\010\001\022\356\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\006client\032\354\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"ACLs" value:<value:"\n.\n\014peer/Propose\022\036\n\034/Channel/Application/Writers\n4\n\022cscc/GetConfigTree\022\036\n\034/Channel/Application/Readers\nF\n$_lifecycle/CommitChaincodeDefinition\022\036\n\034/Channel/Application/Writers\nF\n$_lifecycle/QueryNamespaceDefinitions\022\036\n\034/Channel/Application/Readers\n5\n\023event/FilteredBlock\022\036\n\034/Channel/Application/Readers\n7\n\025lscc/GetChaincodeData\022\036\n\034/Channel/Application/Readers\n?\n\035cscc/SimulateConfigTreeUpdate\022\036\n\034/Channel/Application/Readers\n6\n\024lscc/ChaincodeExists\022\036\n\034/Channel/Application/Readers\n5\n\023cscc/GetConfigBlock\022\036\n\034/Channel/Application/Readers\n9\n\027qscc/GetTransactionByID\022\036\n\034/Channel/Application/Readers\n7\n\025qscc/GetBlockByNumber\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByHash\022\036\n\034/Channel/Application/Readers\nE\n#_lifecycle/QueryChaincodeDefinition\022\036\n\034/Channel/Application/Readers\n3\n\021qscc/GetChainInfo\022\036\n\034/Channel/Application/Readers\n;\n\031peer/ChaincodeToChaincode\022\036\n\034/Channel/Application/Readers\n@\n\036lscc/GetInstantiatedChaincodes\022\036\n\034/Channel/Application/Readers\n8\n\026lscc/GetDeploymentSpec\022\036\n\034/Channel/Application/Readers\n-\n\013event/Block\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByTxID\022\036\n\034/Channel/Application/Readers" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"LifecycleEndorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Orderer" value:<groups:<key:"OrdererOrg" value:<values:<key:"MSP" value:<value:"\022\267\023\n\nOrdererMSP\022\302\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n\"\201\006-----BEGIN CERTIFICATE-----\nMIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI\nzj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn\nJg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG\nA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW\ntUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa\n0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\317\006-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BatchSize" value:<value:"\010\364\003\020\200\200\200\005\030\200\200\200\001" mod_policy:"Admins" > > values:<key:"BatchTimeout" value:<value:"\n\0022s" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"ChannelRestrictions" value:<mod_policy:"Admins" > > values:<key:"ConsensusType" value:<value:"\n\010etcdraft\022\224*\n\375\r\n\024orderer0.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer1.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer2.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\022\022\n\005500ms\020\n\030\001 \005(\200\200\200\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"BlockValidation" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BlockDataHashingStructure" value:<value:"\010\377\377\377\377\017" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"Consortium" value:<value:"\n\020SampleConsortium" mod_policy:"Admins" > > values:<key:"HashingAlgorithm" value:<value:"\n\006SHA256" mod_policy:"Admins" > > values:<key:"OrdererAddresses" value:<value:"\n\031orderer0.example.com:7050\n\031orderer1.example.com:7050\n\031orderer2.example.com:7050" mod_policy:"/Channel/Orderer/Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > "
peer0.org1.example.com | "2019-05-02 09:27:16.216 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 20f Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [lockbasedtxmgr] Done -> DEBU 210 Done with transaction simulation / query execution []"
peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 211 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]"
peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [valinternal] ApplyWriteSet -> DEBU 212 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0025df140)}"
peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 213 validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 214 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 215 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [kvledger] CommitWithPvtData -> DEBU 216 [businesschannel] Committing block [0] to storage"
orderer0.example.com | "2019-05-02 09:27:06.407 UTC [grpc] HandleSubConnStateChange -> DEBU 2f8 pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, CONNECTING"
orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fa Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fb Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:06.422 UTC [grpc] HandleSubConnStateChange -> DEBU 2fc pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, READY"
orderer0.example.com | "2019-05-02 09:27:06.493 UTC [grpc] HandleSubConnStateChange -> DEBU 2fd pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, READY"
orderer0.example.com | "2019-05-02 09:27:07.746 UTC [orderer.common.cluster] Step -> DEBU 2fe Connection from orderer2.example.com(172.18.0.3:56182)"
orderer0.example.com | "2019-05-02 09:27:07.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2ff Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] Step -> INFO 300 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.common.cluster] NewStream -> DEBU 301 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10"
orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 302 Sending msg of 28 bytes to 3 on channel testchainid took 114.2µs"
orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 303 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs "
orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 305 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 306 1 became follower at term 2" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 307 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.753 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs"
orderer0.example.com | "2019-05-02 09:27:07.753 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs "
orderer0.example.com | "2019-05-02 09:27:07.756 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 36"
orderer0.example.com | "2019-05-02 09:27:07.756 UTC [orderer.consensus.etcdraft] run -> INFO 30b raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30c Sending msg of 28 bytes to 3 on channel testchainid took 29.3µs"
orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs "
orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30e Raft leader changed: 0 -> 3" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 310 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs"
orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 311 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131µs "
orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 312 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 313 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs"
orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] sendMessage -> DEBU 314 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs "
orderer0.example.com | "2019-05-02 09:27:08.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU 315 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:08.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 316 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs"
orderer0.example.com | "2019-05-02 09:27:08.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU 317 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.9µs "
orderer0.example.com | "2019-05-02 09:27:09.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 318 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:09.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 319 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs"
orderer0.example.com | "2019-05-02 09:27:09.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 411µs "
orderer0.example.com | "2019-05-02 09:27:09.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:09.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31c Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs"
orderer0.example.com | "2019-05-02 09:27:09.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.6µs "
orderer0.example.com | "2019-05-02 09:27:10.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:10.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31f Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs"
orderer0.example.com | "2019-05-02 09:27:10.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.4µs "
orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] handleMessage -> DEBU 321 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 322 Sending msg of 28 bytes to 3 on channel testchainid took 25µs"
orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] sendMessage -> DEBU 323 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs "
orderer0.example.com | "2019-05-02 09:27:11.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 324 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:11.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 325 Sending msg of 28 bytes to 3 on channel testchainid took 71.5µs"
orderer0.example.com | "2019-05-02 09:27:11.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 326 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.4µs "
orderer0.example.com | "2019-05-02 09:27:11.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 327 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:11.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs"
orderer0.example.com | "2019-05-02 09:27:11.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.2µs "
orderer0.example.com | "2019-05-02 09:27:12.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:12.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32b Sending msg of 28 bytes to 3 on channel testchainid took 30µs"
orderer0.example.com | "2019-05-02 09:27:12.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs "
orderer0.example.com | "2019-05-02 09:27:12.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:12.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs"
orderer0.example.com | "2019-05-02 09:27:12.750 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475.2µs "
orderer0.example.com | "2019-05-02 09:27:13.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:13.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs"
orderer0.example.com | "2019-05-02 09:27:13.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 936µs "
orderer0.example.com | "2019-05-02 09:27:13.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:13.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs"
orderer0.example.com | "2019-05-02 09:27:13.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.7µs "
orderer0.example.com | "2019-05-02 09:27:14.124 UTC [orderer.common.server] Deliver -> DEBU 336 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 337 Starting new deliver loop for 172.18.0.8:57138"
orderer0.example.com | "2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 338 Attempting to read seek info message from 172.18.0.8:57138"
orderer0.example.com | "2019-05-02 09:27:14.153 UTC [orderer.common.server] Broadcast -> DEBU 339 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:14.153 UTC [orderer.common.broadcast] Handle -> DEBU 33a Starting new broadcast loop for 172.18.0.8:57140"
orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 33b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57140"
orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33c Processing config update tx with system channel message processor for channel ID businesschannel"
orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33d Processing channel create tx for channel businesschannel on system channel testchainid"
orderer0.example.com | "2019-05-02 09:27:14.156 UTC [common.channelconfig] NewStandardValues -> DEBU 33e Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:14.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 342 Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 343 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.158 UTC [common.channelconfig] NewStandardValues -> DEBU 344 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:14.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 345 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 347 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 348 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:14.161 UTC [common.channelconfig] initializeProtosStruct -> DEBU 349 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34a Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34b Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34d Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.163 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34e Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.163 UTC [common.channelconfig] validateMSP -> DEBU 34f Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] newBccspMsp -> DEBU 350 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] New -> DEBU 351 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] Setup -> DEBU 352 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:14.166 UTC [msp.identity] newIdentity -> DEBU 353 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [ledgerstorage] CommitWithPvtData -> DEBU 217 Writing block [0] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:16.221 UTC [pvtdatastorage] Prepare -> DEBU 218 Saved 0 private data write sets for block [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 219 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets=
peer0.org1.example.com | txId= locPointer=offset=39, bytesLength=23894
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21a Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx ID: [] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21b Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx number:[0] ID: [] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:16.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 21c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23939], isChainEmpty=[false], lastBlockNumber=[0]"
peer0.org1.example.com | "2019-05-02 09:27:16.229 UTC [pvtdatastorage] Commit -> DEBU 21d Committing private data for block [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] Commit -> DEBU 21e Committed private data for block [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] func1 -> DEBU 21f Purger started: Purging expired private data till block number [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 220 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}"
peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 221 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [pvtdatastorage] func1 -> DEBU 222 Purger finished"
peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [kvledger] CommitWithPvtData -> DEBU 223 [businesschannel] Committing block [0] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [lockbasedtxmgr] Commit -> DEBU 224 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 225 Preparing potential purge list working-set for expiringAtBlk [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 227 No expiry entry found for expiringAtBlk [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 228 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 229 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 22a Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [stateleveldb] ApplyUpdates -> DEBU 22b Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]"
peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] Commit -> DEBU 22c Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] func1 -> DEBU 22d launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [kvledger] CommitWithPvtData -> DEBU 22e [businesschannel] Committing block [0] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 22f Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 230 Skipping transaction [0] since it is not an endorsement transaction"
peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231 Preparing potential purge list working-set for expiringAtBlk [1]"
peer0.org1.example.com | "2019-05-02 09:27:16.238 UTC [leveldbhelper] GetIterator -> DEBU 232 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:16.238 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 233 No expiry entry found for expiringAtBlk [1]"
peer0.org1.example.com | "2019-05-02 09:27:16.240 UTC [historyleveldb] Commit -> DEBU 234 Channel [businesschannel]: Updates committed to history database for blockNo [0]"
peer0.org1.example.com | "2019-05-02 09:27:16.240 UTC [kvledger] CommitWithPvtData -> INFO 235 [businesschannel] Committed block [0] with 1 transaction(s) in 30ms (state_validation=8ms block_commit=12ms state_commit=5ms)"
peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [ledgermgmt] CreateLedger -> INFO 236 Created ledger [businesschannel] with genesis block"
peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 237 constructing new query executor txid = [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]"
peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [stateleveldb] GetState -> DEBU 238 GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY"
peer0.org1.example.com | "2019-05-02 09:27:16.245 UTC [lockbasedtxmgr] Done -> DEBU 239 Done with transaction simulation / query execution [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]"
peer0.org1.example.com | "2019-05-02 09:27:16.245 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.ChannelProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: Consortium"
peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.OrdererProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: KafkaBrokers"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 247 Initializing protos for *channelconfig.OrdererOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Endpoints"
peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] validateMSP -> DEBU 24b Setting up MSP for org OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] newBccspMsp -> DEBU 24c Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] New -> DEBU 24d Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] Setup -> DEBU 24e Setting up MSP instance OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:16.250 UTC [msp.identity] newIdentity -> DEBU 24f Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.251 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [msp] Validate -> DEBU 251 MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 252 Initializing protos for *channelconfig.ApplicationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: ACLs"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] NewStandardValues -> DEBU 257 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] Validate -> DEBU 259 Anchor peers for org Org1MSP are "
peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.255 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.168 UTC [msp.identity] newIdentity -> DEBU 354 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.169 UTC [msp] Validate -> DEBU 355 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.169 UTC [common.channelconfig] NewStandardValues -> DEBU 356 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 357 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 358 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 359 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35a Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.172 UTC [common.channelconfig] Validate -> DEBU 35d Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:14.173 UTC [common.channelconfig] validateMSP -> DEBU 35e Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.173 UTC [msp] newBccspMsp -> DEBU 35f Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.173 UTC [msp] New -> DEBU 360 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.174 UTC [msp] Setup -> DEBU 361 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.175 UTC [msp.identity] newIdentity -> DEBU 362 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.176 UTC [msp.identity] newIdentity -> DEBU 363 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.177 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.177 UTC [msp] Validate -> DEBU 365 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.178 UTC [msp] getCertificationChain -> DEBU 366 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [msp] hasOURole -> DEBU 367 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [msp] getCertificationChain -> DEBU 368 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 369 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 36b Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.180 UTC [common.channelconfig] Validate -> DEBU 36d Anchor peers for org Org1MSP are "
orderer0.example.com | "2019-05-02 09:27:14.181 UTC [common.channelconfig] validateMSP -> DEBU 36e Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] newBccspMsp -> DEBU 36f Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] New -> DEBU 370 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] Setup -> DEBU 371 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.182 UTC [msp.identity] newIdentity -> DEBU 372 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [common.channelconfig] Validate -> DEBU 269 Anchor peers for org Org2MSP are "
peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [common.channelconfig] validateMSP -> DEBU 26a Setting up MSP for org Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] newBccspMsp -> DEBU 26b Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] New -> DEBU 26c Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] Setup -> DEBU 26d Setting up MSP instance Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.259 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.260 UTC [msp.identity] newIdentity -> DEBU 26f Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:16.261 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 270 Checking if identity satisfies role [CLIENT] for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.261 UTC [msp] Validate -> DEBU 271 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 272 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] hasOURole -> DEBU 273 MSP Org2MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 274 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 275 Setting up the MSP manager (3 msps)"
peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 276 MSP manager setup complete, setup 3 msps"
peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy BlockValidation for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Readers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Writers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Admins for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Endorsement for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Endorsement for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Readers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Writers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy LifecycleEndorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Endorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 289 Proposed new policy Writers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Admins for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28b Proposed new policy Readers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28c Proposed new policy Writers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28d Proposed new policy Admins for Channel"
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.183 UTC [msp.identity] newIdentity -> DEBU 373 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 374 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.185 UTC [msp] Validate -> DEBU 375 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 376 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] hasOURole -> DEBU 377 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 378 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 379 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 37a MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:14.187 UTC [policies] NewManagerImpl -> DEBU 37b Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37c Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37d Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37e Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37f Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 380 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 381 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 382 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 383 Proposed new policy ChannelCreationPolicy for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 384 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 385 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 386 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 387 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 388 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 389 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.191 UTC [policies] NewManagerImpl -> DEBU 38a Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.191 UTC [policies] GetPolicy -> DEBU 38b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38c Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38d Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38e Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38f Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 390 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.209 UTC [common.configtx] verifyDeltaSet -> DEBU 3c8 Processing change to key: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.209 UTC [common.configtx] policyForItem -> DEBU 3c9 Getting policy for item Application with mod_policy ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3ca Manager Channel looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cb Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cc Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cd Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3ce Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cf Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d0 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d1 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d2 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy =="
orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:14.212 UTC [msp] DeserializeIdentity -> DEBU 3d6 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:14.212 UTC [msp.identity] newIdentity -> DEBU 3d7 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Value] /Channel/Consortium"
peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Value] /Channel/OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Value] /Channel/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Value] /Channel/HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Policy] /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Policy] /Channel/Writers"
peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Policy] /Channel/Admins"
peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.capabilities] Supported -> DEBU 2ba Application capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.capabilities] Supported -> DEBU 2bb Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bd As expected, current configuration has policy '/Channel/Writers'"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2be Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2bf Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c0 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c1 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c2 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c3 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c4 As expected, current configuration has policy '/Channel/Application/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c5 As expected, current configuration has policy '/Channel/Application/Writers'"
peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c6 As expected, current configuration has policy '/Channel/Application/Admins'"
peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c7 Manager Channel looking up path [Orderer]"
peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c8 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c9 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2ca Manager Channel/Orderer looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2cb Manager Channel/Orderer has managers OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2cd Processing new config for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2ce Calling out because config was updated for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] updateAnchors -> DEBU 2cf Org1MSP anchor peers: []"
peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d0 Org2MSP anchor peers: []"
peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d1 Creating state provider for chainID businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.gossip] JoinChan -> INFO 2d2 Joining gossip network of channel businesschannel with 2 organizations"
peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d3 No configured anchor peers of Org1MSP for channel businesschannel to learn about"
peer0.org1.example.com | "2019-05-02 09:27:16.284 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d4 No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer0.org1.example.com | "2019-05-02 09:27:16.284 UTC [peer] updateTrustedRoots -> DEBU 2d5 Updating trusted root authorities for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d6 updating root CAs for channel [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d7 adding orderer root CAs for MSP [OrdererMSP]"
peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d8 adding app root CAs for MSP [Org1MSP]"
peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d9 adding app root CAs for MSP [Org2MSP]"
peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2da CreateDirIfMissing [/var/hyperledger/production/transientStore/]"
peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2db Before creating dir - [/var/hyperledger/production/transientStore/] does not exist"
peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2dc After creating dir - [/var/hyperledger/production/transientStore/] exists"
peer0.org1.example.com | "2019-05-02 09:27:16.312 UTC [gossip.service] InitializeChannel -> DEBU 2dd Creating state provider for chainID businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2de Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 "
peer0.org1.example.com | "2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2df Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 "
peer0.org1.example.com | "2019-05-02 09:27:16.315 UTC [gossip.privdata] NewReconciler -> DEBU 2e0 Private data reconciliation is enabled"
peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> INFO 2e1 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1"
peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> DEBU 2e2 Updating gossip ledger height to 1"
peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e3 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 "
peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e4 Sign: digest: 8B78C9A6480A8CF41DAD7D6C38347BBE000B4649C45AD2CBB13B3B21E63B0471 "
peer0.org1.example.com | "2019-05-02 09:27:16.320 UTC [gossip.service] InitializeChannel -> DEBU 2e5 Delivery uses dynamic leader election mechanism, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.321 UTC [peer] InitChain -> DEBU 2e6 Initializing channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.322 UTC [nodeCmd] func6 -> DEBU 2e9 Deploying system CC, for channel <businesschannel>"
peer0.org1.example.com | "2019-05-02 09:27:16.321 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2e7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:16.322 UTC [gossip.election] handleMessages -> DEBU 2e8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ec Entry"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2ed [2d70ce9e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Notify -> DEBU 2ee [2d70ce9e] notifying Txid:2d70ce9e-c497-49ba-98e6-086bbe3a68c0, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ef Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [sccapi] deploySysCC -> INFO 2f0 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] Done -> DEBU 2f1 Done with transaction simulation / query execution [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f2 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f3 constructing new tx simulator txid = [aaa0bcce-8228-4523-9513-7572889c7e8a]"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2f4 Entry"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [cscc] Init -> INFO 2f5 Init CSCC"
peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2f6 [aaa0bcce] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 2f7 [aaa0bcce] notifying Txid:aaa0bcce-8228-4523-9513-7572889c7e8a, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2f8 Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 2f9 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 2fa Done with transaction simulation / query execution [aaa0bcce-8228-4523-9513-7572889c7e8a]"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fb constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fc constructing new tx simulator txid = [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2fd Entry"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [qscc] Init -> INFO 2fe Init QSCC"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] handleMessage -> DEBU 2ff [4eccbbcc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3d8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3d9 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs"
orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs "
orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func1 -> DEBU 3db 0xc0008b6530 gate 1556789234216356100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dc 0xc0008b6530 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dd 0xc0008b6530 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3de 0xc0008b6530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3df 0xc0008b6530 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func1 -> DEBU 3e0 0xc0008b6530 gate 1556789234216356100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:14.217 UTC [policies] Evaluate -> DEBU 3e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func1 -> DEBU 3e4 0xc0008b76b0 gate 1556789234218928400 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e5 0xc0008b76b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e6 0xc0008b76b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:14.219 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3e7 Checking if identity satisfies ADMIN role for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.220 UTC [cauthdsl] func2 -> DEBU 3e8 0xc0008b76b0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3e9 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S|
orderer0.example.com | 00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|"
orderer0.example.com | "2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3ea Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..|
orderer0.example.com | 00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.|
orderer0.example.com | 00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU|
orderer0.example.com | 00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t|
orderer0.example.com | 00000040 7d 02 b5 e9 86 99 |}.....|"
orderer0.example.com | "2019-05-02 09:27:14.225 UTC [cauthdsl] func2 -> DEBU 3eb 0xc0008b76b0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:14.225 UTC [cauthdsl] func1 -> DEBU 3ec 0xc0008b76b0 gate 1556789234218928400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ed Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ef Signature set satisfies policy /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.226 UTC [policies] Evaluate -> DEBU 3f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.226 UTC [common.configtx] verifyDeltaSet -> DEBU 3f1 Processing change to key: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f7 Processing change to key: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f8 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f9 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fa Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fb Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fc Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fd Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fe Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3ff Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.233 UTC [common.configtx] recurseConfigMap -> DEBU 400 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 401 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 402 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 300 [4eccbbcc] notifying Txid:4eccbbcc-0bc1-47ee-9bf9-ad847826e38f, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 301 Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 302 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed"
peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 303 Done with transaction simulation / query execution [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 304 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 305 constructing new tx simulator txid = [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 306 Entry"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] handleMessage -> DEBU 307 [d66845b9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Notify -> DEBU 308 [d66845b9] notifying Txid:d66845b9-8103-46a2-ad5d-eccb84f8e2e1, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 309 Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [sccapi] deploySysCC -> INFO 30a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30b Done with transaction simulation / query execution [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 30c constructing new query executor txid = [3859875e-d985-49dd-a968-59cd4a08ce53]"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 30d Returning []"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30e Done with transaction simulation / query execution [3859875e-d985-49dd-a968-59cd4a08ce53]"
peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [msp.identity] Sign -> DEBU 30f Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 "
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [msp.identity] Sign -> DEBU 310 Sign: digest: FA734A64D20B4ADC12D7D68112DB4CE8D3BFB6E481C65D686855FEEBA9B327D3 "
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 311 Listeners for channel businesschannel invoked"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] handleMessage -> DEBU 312 [dbf7024a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] Notify -> DEBU 313 [dbf7024a] notifying Txid:dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] Execute -> DEBU 314 Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] callChaincode -> INFO 315 [][dbf7024a] Exit chaincode: name:"cscc" (160ms)"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] SimulateProposal -> DEBU 316 [][dbf7024a] Exit"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] func1 -> DEBU 317 Exit: request from 172.18.0.8:57196"
peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [comm.grpc.server] 1 -> INFO 318 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57196 grpc.code=OK grpc.call_duration=166.7647ms
peer0.org1.example.com | "2019-05-02 09:27:16.331 UTC [grpc] warningf -> DEBU 319 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57196: read: connection reset by peer"
peer0.org1.example.com | "2019-05-02 09:27:16.331 UTC [grpc] infof -> DEBU 31a transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.pull] Hello -> DEBU 31b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] Send -> DEBU 31c Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6173781539121442575 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6173781539121442575 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [msp.identity] Sign -> DEBU 31f Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 320 Sign: digest: 6E6BFE1B00C82FA9E2C4DD1D85FC07A35A386C6C84DE322084C7EA918F28FD50 "
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 321 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 322 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] Send -> DEBU 323 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 324 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.237 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 40f Sign: plaintext: 0AD2060A1B08011A0608F2EFAAE60522...2B4A1C0498989CB418996DBC241BDFD9 "
orderer0.example.com | "2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 410 Sign: digest: DC2D9F9564EAF37BA9F69AAE8C22B42AB99D6A9EE3A09446DAF53F04513B57FB "
orderer0.example.com | "2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 411 Sign: plaintext: 0ACE060A1708041A0608F2EFAAE60522...E052C51F0D3B206F9EFB9A4DE09B6230 "
orderer0.example.com | "2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 412 Sign: digest: 12FAEDAB443FA508631D7D64AA5E3CDFC584DEA945117649CD4FE37A9F0EEA29 "
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 413 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 414 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 415 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers =="
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 416 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 417 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
orderer0.example.com | "2019-05-02 09:27:14.239 UTC [msp] DeserializeIdentity -> DEBU 418 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:14.240 UTC [msp.identity] newIdentity -> DEBU 419 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.240 UTC [cauthdsl] func1 -> DEBU 41a 0xc00091e3e0 gate 1556789234240548300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41b 0xc00091e3e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41c 0xc00091e3e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:14.241 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 41d Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp] Validate -> DEBU 41e MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.242 UTC [cauthdsl] func2 -> DEBU 41f 0xc00091e3e0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 420 Verify: digest = 00000000 12 fa ed ab 44 3f a5 08 63 1d 7d 64 aa 5e 3c df |....D?..c.}d.^<.|
orderer0.example.com | 00000010 c5 84 de a9 45 11 76 49 cd 4f e3 7a 9f 0e ea 29 |....E.vI.O.z...)|"
orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 421 Verify: sig = 00000000 30 45 02 21 00 bf a9 2c ea a3 4b d3 1b 86 bf 38 |0E.!...,..K....8|
orderer0.example.com | 00000010 5e 65 0b 45 ae 4e 13 3a ff e5 27 5b c6 12 77 da |^e.E.N.:..'[..w.|
orderer0.example.com | 00000020 2c 07 09 f2 8f 02 20 69 33 cd d4 ff e7 0e 3f 7e |,..... i3.....?~|
orderer0.example.com | 00000030 b2 8c f5 b5 44 73 cb 4f 17 9d fa f3 41 c1 3d 31 |....Ds.O....A.=1|
orderer0.example.com | 00000040 b3 a6 61 9e ec 61 0e |..a..a.|"
orderer0.example.com | "2019-05-02 09:27:14.244 UTC [cauthdsl] func2 -> DEBU 422 0xc00091e3e0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:14.244 UTC [cauthdsl] func1 -> DEBU 423 0xc00091e3e0 gate 1556789234240548300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 424 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 425 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 426 Signature set satisfies policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 427 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 428 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.246 UTC [policies] Evaluate -> DEBU 429 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] NewStandardValues -> DEBU 42a Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42b Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42d Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] NewStandardValues -> DEBU 430 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 432 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 433 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 434 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 435 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 437 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 439 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43a Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.250 UTC [common.channelconfig] validateMSP -> DEBU 43b Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] newBccspMsp -> DEBU 43c Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] New -> DEBU 43d Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] Setup -> DEBU 43e Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:14.251 UTC [msp.identity] newIdentity -> DEBU 43f Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.252 UTC [msp.identity] newIdentity -> DEBU 440 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] Validate -> DEBU 441 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 442 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 443 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 444 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 445 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 446 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 447 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 448 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] Validate -> DEBU 449 Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] validateMSP -> DEBU 44a Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] newBccspMsp -> DEBU 44b Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] New -> DEBU 44c Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.254 UTC [msp] Setup -> DEBU 44d Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 325 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.074 UTC [gossip.gossip] handleMessage -> DEBU 326 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.076 UTC [gossip.pull] HandleMessage -> DEBU 327 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.076 UTC [gossip.gossip] handleMessage -> DEBU 328 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 329 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 32a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32c Verify: digest = 00000000 6e 6b fe 1b 00 c8 2f a9 e2 c4 dd 1d 85 fc 07 a3 |nk..../.........|
peer0.org1.example.com | 00000010 5a 38 6c 6c 84 de 32 20 84 c7 ea 91 8f 28 fd 50 |Z8ll..2 .....(.P|"
peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32d Verify: sig = 00000000 30 45 02 21 00 ef 55 3c db c8 8d 10 b7 f6 bc c3 |0E.!..U<........|
peer0.org1.example.com | 00000010 3e ca 32 24 25 58 31 a1 ba d2 53 bf f4 60 36 f1 |>.2$%X1...S..`6.|
peer0.org1.example.com | 00000020 af 1d d0 34 fb 02 20 77 78 16 b2 2a d8 1f b4 15 |...4.. wx..*....|
peer0.org1.example.com | 00000030 8d a2 00 d4 e1 54 35 23 2a 8d d5 80 1a 38 63 06 |.....T5#*....8c.|
peer0.org1.example.com | 00000040 9b 89 af e8 2d 54 3e |....-T>|"
peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32f Verify: sig = 00000000 30 45 02 21 00 95 ca 6f 83 1a ed 86 98 57 ad 1b |0E.!...o.....W..|
peer0.org1.example.com | 00000010 ba 05 27 96 d4 8d be a5 3b 2c eb 55 a2 2b fc d9 |..'.....;,.U.+..|
peer0.org1.example.com | 00000020 65 9c 37 13 15 02 20 71 10 c2 cd 18 91 db 75 18 |e.7... q......u.|
peer0.org1.example.com | 00000030 7a c3 34 51 58 91 89 a8 a2 00 b5 4b 6e c7 81 e2 |z.4QX......Kn...|
peer0.org1.example.com | 00000040 a0 ba ab 6d 5d 9d 38 |...m].8|"
peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 330 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] isSentByMe -> DEBU 331 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 332 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.080 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.114 UTC [gossip.gossip] handleMessage -> DEBU 334 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10853311913159645400 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44f Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.pull] HandleMessage -> DEBU 335 GossipMessage: tag:EMPTY hello:<nonce:10853311913159645400 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.pull] SendDigest -> DEBU 336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.gossip] handleMessage -> DEBU 337 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 338 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33a Verify: digest = 00000000 5e 21 fd c3 3f 6b bf 46 7d ad 72 6a a3 9b eb df |^!..?k.F}.rj....|
peer0.org1.example.com | 00000010 94 bf 54 d0 c0 a5 d1 69 35 6a f8 7f ab 9f 80 bb |..T....i5j......|"
peer0.org1.example.com | "2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33b Verify: sig = 00000000 30 45 02 21 00 b8 44 6c c1 b1 87 c8 b1 3d a5 9c |0E.!..Dl.....=..|
peer0.org1.example.com | 00000010 96 34 88 3e 19 72 cc 99 f1 a2 76 b2 d9 05 26 94 |.4.>.r....v...&.|
peer0.org1.example.com | 00000020 d6 1e 97 c1 35 02 20 44 31 23 1d 1c dd cb 6a 76 |....5. D1#....jv|
peer0.org1.example.com | 00000030 95 bb c4 88 ce 5f 94 a9 95 26 b5 5e b9 dd 85 5b |....._...&.^...[|
peer0.org1.example.com | 00000040 b5 e5 5c d4 29 4c f6 |..\.)L.|"
peer0.org1.example.com | "2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33d Verify: sig = 00000000 30 45 02 21 00 f3 ca ca ef 97 c0 e8 29 a2 23 c4 |0E.!........).#.|
peer0.org1.example.com | 00000010 fb d2 50 11 be 9b 7a 4e 4b 7d 70 87 22 f0 d4 64 |..P...zNK}p."..d|
peer0.org1.example.com | 00000020 7b fb 91 82 32 02 20 49 7b 56 2d c4 03 d5 51 4c |{...2. I{V-...QL|
peer0.org1.example.com | 00000030 68 8a 8c 6f 38 c5 ee 5d 6b 7d bf 30 20 04 00 5b |h..o8..]k}.0 ..[|
peer0.org1.example.com | 00000040 af ac 81 20 6f 36 cd |... o6.|"
peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 340 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 "
peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 341 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 "
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 342 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 343 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 344 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 345 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] sendMemResponse -> DEBU 346 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.comm] Send -> DEBU 347 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.discovery] sendMemResponse -> DEBU 348 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 349 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 34a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 34b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] waitForMembershipStabilization -> DEBU 34c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1"
peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] leaderElection -> DEBU 34d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 350 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08BCA7ABE8FEF1B4CD151001 "
peer0.org1.example.com | "2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 351 Sign: digest: 5CF0E972D4F2A13EEB0551D5D89C9BCC32A7CFC77553710AEE74BA7D35FC5DEC "
peer0.org1.example.com | "2019-05-02 09:27:17.326 UTC [gossip.election] waitForInterrupt -> DEBU 352 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [endorser] ProcessProposal -> DEBU 353 Entering: request from 172.18.0.8:57204"
peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [protoutils] ValidateProposalMessage -> DEBU 354 ValidateProposalMessage starts for signed proposal 0xc002d6f090"
peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [protoutils] validateChannelHeader -> DEBU 355 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 356 begin"
peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 357 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 358 creator is valid"
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] Validate -> DEBU 451 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] getCertificationChain -> DEBU 452 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] hasOURole -> DEBU 453 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.258 UTC [msp] getCertificationChain -> DEBU 454 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 455 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 457 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.261 UTC [common.channelconfig] Validate -> DEBU 459 Anchor peers for org Org1MSP are "
orderer0.example.com | "2019-05-02 09:27:14.261 UTC [common.channelconfig] validateMSP -> DEBU 45a Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] newBccspMsp -> DEBU 45b Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] New -> DEBU 45c Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] Setup -> DEBU 45d Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.262 UTC [msp.identity] newIdentity -> DEBU 45e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.263 UTC [msp.identity] newIdentity -> DEBU 45f Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.264 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 460 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.264 UTC [msp] Validate -> DEBU 461 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 462 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] hasOURole -> DEBU 463 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 464 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 465 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 466 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 467 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 468 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 469 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46a Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46b Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46c Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46d Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46e Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46f Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 470 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 471 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy ChannelCreationPolicy for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 477 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 479 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.269 UTC [policies] NewManagerImpl -> DEBU 47a Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.269 UTC [policies] GetPolicy -> DEBU 47b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.270 UTC [policies] NewManagerImpl -> DEBU 47c Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..|
peer0.org1.example.com | 00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|"
peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 35a Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.|
peer0.org1.example.com | 00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR<H!r|
peer0.org1.example.com | 00000020 d3 6b d8 82 02 20 55 a7 f8 c7 88 1d 74 75 42 74 |.k... U.....tuBt|
peer0.org1.example.com | 00000030 10 6d a5 11 1f 09 7c 23 5a be c2 d2 b3 cf a6 6f |.m....|#Z......o|
peer0.org1.example.com | 00000040 cc 73 38 fe d7 16 |.s8...|"
peer0.org1.example.com | "2019-05-02 09:27:17.520 UTC [protoutils] checkSignatureFromCreator -> DEBU 35b exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:17.520 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35c validateChaincodeProposalMessage starts for proposal 0xc002643a40, header 0xc002d6f4a0"
peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] preProcess -> DEBU 35e [][023c903b] processing txid: 023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c"
peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] SimulateProposal -> DEBU 35f [][023c903b] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] callChaincode -> INFO 360 [][023c903b] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [chaincode] Execute -> DEBU 361 Entry"
peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [cscc] Invoke -> DEBU 362 Invoke function: GetChannels"
peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 363 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:17.523 UTC [msp] Validate -> DEBU 364 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 365 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..|
peer0.org1.example.com | 00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|"
peer0.org1.example.com | "2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 366 Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.|
peer0.org1.example.com | 00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR<H!r|
peer0.org1.example.com | 00000020 d3 6b d8 82 02 20 55 a7 f8 c7 88 1d 74 75 42 74 |.k... U.....tuBt|
peer0.org1.example.com | 00000030 10 6d a5 11 1f 09 7c 23 5a be c2 d2 b3 cf a6 6f |.m....|#Z......o|
peer0.org1.example.com | 00000040 cc 73 38 fe d7 16 |.s8...|"
peer0.org1.example.com | "2019-05-02 09:27:17.525 UTC [chaincode] handleMessage -> DEBU 367 [023c903b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:17.525 UTC [chaincode] Notify -> DEBU 368 [023c903b] notifying Txid:023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [chaincode] Execute -> DEBU 369 Exit"
peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] callChaincode -> INFO 36a [][023c903b] Exit chaincode: name:"cscc" (4ms)"
peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] SimulateProposal -> DEBU 36b [][023c903b] Exit"
peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] func1 -> DEBU 36c Exit: request from 172.18.0.8:57204"
peer0.org1.example.com | "2019-05-02 09:27:17.527 UTC [comm.grpc.server] 1 -> INFO 36d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57204 grpc.code=OK grpc.call_duration=8.4436ms
peer0.org1.example.com | "2019-05-02 09:27:17.530 UTC [grpc] infof -> DEBU 36e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [endorser] ProcessProposal -> DEBU 36f Entering: request from 172.18.0.8:57212"
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] ValidateProposalMessage -> DEBU 370 ValidateProposalMessage starts for signed proposal 0xc002d41a40"
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] validateChannelHeader -> DEBU 371 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 372 begin"
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 373 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 375 Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G|
peer0.org1.example.com | 00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|"
peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 376 Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...|
peer0.org1.example.com | 00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..|
peer0.org1.example.com | 00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...|
peer0.org1.example.com | 00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":|
peer0.org1.example.com | 00000040 63 8c 2f 4a b4 09 |c./J..|"
peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [protoutils] checkSignatureFromCreator -> DEBU 377 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 378 validateChaincodeProposalMessage starts for proposal 0xc002cdce00, header 0xc002d41e50"
peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 379 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] preProcess -> DEBU 37a [][716a73c1] processing txid: 716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234"
peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] SimulateProposal -> DEBU 37b [][716a73c1] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] callChaincode -> INFO 37c [][716a73c1] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [chaincode] Execute -> DEBU 37d Entry"
peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [qscc] Invoke -> DEBU 37e Invoke function: GetChainInfo on chain: businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 37f acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo"
peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 380 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [msp] DeserializeIdentity -> DEBU 384 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:18.456 UTC [msp.identity] newIdentity -> DEBU 385 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:18.458 UTC [cauthdsl] func1 -> DEBU 386 0xc002e019d0 gate 1556789238458692400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:18.458 UTC [cauthdsl] func2 -> DEBU 387 0xc002e019d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [cauthdsl] func2 -> DEBU 388 0xc002e019d0 processing identity 0 with bytes of 10fffc0"
orderer0.example.com | "2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b4 Processing change to key: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b5 Processing change to key: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 389 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [msp] Validate -> DEBU 38a MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:18.460 UTC [msp] getCertificationChain -> DEBU 38b MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [cauthdsl] func2 -> DEBU 38c 0xc002e019d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38d Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G|
peer0.org1.example.com | 00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|"
peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38e Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...|
peer0.org1.example.com | 00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..|
peer0.org1.example.com | 00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...|
peer0.org1.example.com | 00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":|
peer0.org1.example.com | 00000040 63 8c 2f 4a b4 09 |c./J..|"
peer0.org1.example.com | "2019-05-02 09:27:18.462 UTC [cauthdsl] func2 -> DEBU 38f 0xc002e019d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [cauthdsl] func1 -> DEBU 390 0xc002e019d0 gate 1556789238458692400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 391 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 392 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 393 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] handleMessage -> DEBU 395 [716a73c1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] Notify -> DEBU 396 [716a73c1] notifying Txid:716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] Execute -> DEBU 397 Exit"
peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [endorser] callChaincode -> INFO 398 [][716a73c1] Exit chaincode: name:"qscc" (11ms)"
peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [endorser] SimulateProposal -> DEBU 399 [][716a73c1] Exit"
peer0.org1.example.com | "2019-05-02 09:27:18.465 UTC [endorser] func1 -> DEBU 39a Exit: request from 172.18.0.8:57212"
peer0.org1.example.com | "2019-05-02 09:27:18.465 UTC [comm.grpc.server] 1 -> INFO 39b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57212 grpc.code=OK grpc.call_duration=14.4182ms
peer0.org1.example.com | "2019-05-02 09:27:18.469 UTC [grpc] infof -> DEBU 39c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151008 "
peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39e Sign: digest: EF09E2D58682A805749A98A96E2B543A0C3248E6F007BFAD30F068D012DEB0FD "
peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 3a0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3a1 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] Send -> DEBU 3a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3a9 Verify: digest = 00000000 ed 47 db 57 06 c0 5e 0d e1 8c 81 a0 02 35 2f 1a |.G.W..^......5/.|
peer0.org1.example.com | 00000010 94 23 9a 81 4e 5b 68 32 3c e0 b3 4f 76 60 72 95 |.#..N[h2<..Ov`r.|"
peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3aa Verify: sig = 00000000 30 44 02 20 31 b9 af 62 ef d4 94 05 d7 2d d8 61 |0D. 1..b.....-.a|
peer0.org1.example.com | 00000010 41 6f 0e c1 5d 1f ff ed d6 5b f5 55 e3 5a b5 18 |Ao..]....[.U.Z..|
peer0.org1.example.com | 00000020 bb 50 fd 15 02 20 51 de 62 25 cb 58 6a 8e 04 42 |.P... Q.b%.Xj..B|
peer0.org1.example.com | 00000030 c0 98 cc 3f 02 75 fb de 0c 81 3d 46 96 19 3c 11 |...?.u....=F..<.|
peer0.org1.example.com | 00000040 83 8a a5 e8 02 f6 |......|"
peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3ab Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [msp.identity] Verify -> DEBU 3ac Verify: sig = 00000000 30 45 02 21 00 9c a1 11 d3 49 e8 bc 1c 50 d3 4c |0E.!.....I...P.L|
peer0.org1.example.com | 00000010 d1 c8 73 f4 b3 77 ff 2d de a7 b9 b3 51 a6 69 35 |..s..w.-....Q.i5|
peer0.org1.example.com | 00000020 6e db 41 3a 23 02 20 1f a1 d1 b3 ec 4b 5f ef 62 |n.A:#. .....K_.b|
peer0.org1.example.com | 00000030 ed e1 84 09 ac e9 47 df e9 f7 e3 c4 f6 67 c0 7f |......G......g..|
peer0.org1.example.com | 00000040 b2 ee bb ce 57 6c 24 |....Wl$|"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 "
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 "
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----
peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.283 UTC [gossip.comm] Send -> DEBU 3b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:20.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3b7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3b8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.287 UTC [msp.identity] Verify -> DEBU 3b9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h|
peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y<vd...|"
peer0.org1.example.com | "2019-05-02 09:27:20.287 UTC [msp.identity] Verify -> DEBU 3ba Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....|
peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b|
peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..|
peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.|
peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [msp] DeserializeIdentity -> DEBU 3c0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [msp.identity] newIdentity -> DEBU 3c1 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b6 Processing change to key: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b7 Processing change to key: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4ba Processing change to key: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [common.configtx] policyForItem -> DEBU 4bb Getting policy for item Application with mod_policy ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bc Manager Channel looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bd Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4be Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bf Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4c0 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c1 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c2 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c3 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c4 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy =="
orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:14.285 UTC [policies] Evaluate -> DEBU 4c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:14.285 UTC [msp] DeserializeIdentity -> DEBU 4c8 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:14.286 UTC [msp.identity] newIdentity -> DEBU 4c9 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4ca 0xc000b52160 gate 1556789234287363800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cb 0xc000b52160 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cc 0xc000b52160 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cd 0xc000b52160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4ce 0xc000b52160 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4cf 0xc000b52160 gate 1556789234287363800 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:14.287 UTC [policies] Evaluate -> DEBU 4d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:14.288 UTC [cauthdsl] func1 -> DEBU 4d3 0xc000b532e0 gate 1556789234288629900 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d4 0xc000b532e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d5 0xc000b532e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d6 Checking if identity satisfies ADMIN role for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d7 0xc000b532e0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d8 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S|
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | 00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|"
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d9 Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..|
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | 00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.|
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
orderer0.example.com | 00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU|
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
orderer0.example.com | 00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t|
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
orderer0.example.com | 00000040 7d 02 b5 e9 86 99 |}.....|"
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4da 0xc000b532e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func1 -> DEBU 4db 0xc000b532e0 gate 1556789234288629900 evaluation succeeds"
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [cauthdsl] func1 -> DEBU 3c2 0xc002e58140 gate 1556789240288894500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c3 0xc002e58140 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c4 0xc002e58140 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3c8 0xc002e58140 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [msp.identity] Verify -> DEBU 3c9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h|
peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y<vd...|"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [msp.identity] Verify -> DEBU 3ca Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....|
peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b|
peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..|
peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.|
peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3cb 0xc002e58140 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func1 -> DEBU 3cc 0xc002e58140 gate 1556789240288894500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cd Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:20.291 UTC [policies] Evaluate -> DEBU 3d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:20.291 UTC [gossip.gossip] handleMessage -> DEBU 3d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] Send -> DEBU 3d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.542 UTC [gossip.gossip] handleMessage -> DEBU 3d5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d7 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3146363792626545915 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.545 UTC [gossip.pull] HandleMessage -> DEBU 3d8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3146363792626545915 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.545 UTC [gossip.gossip] handleMessage -> DEBU 3d9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:20.547 UTC [gossip.gossip] handleMessage -> DEBU 3da Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789236573790800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:20.548 UTC [msp.identity] Verify -> DEBU 3db Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h|
peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y<vd...|"
peer0.org1.example.com | "2019-05-02 09:27:20.548 UTC [msp.identity] Verify -> DEBU 3dc Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....|
peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b|
peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..|
peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.|
peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|"
peer0.org1.example.com | "2019-05-02 09:27:20.549 UTC [gossip.gossip] handleMessage -> DEBU 3dd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.070 UTC [gossip.pull] Hello -> DEBU 3de Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:21.070 UTC [msp.identity] Sign -> DEBU 3df Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151009 "
peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e0 Sign: digest: 0E943797D8D439F6639B66FD538EC511BE9DB7FCC43AA95E3077CB08A6CCE129 "
peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] Send -> DEBU 3e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] Send -> DEBU 3e6 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:785619318732718520 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:785619318732718520 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3e9 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ea Exiting"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dc Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4de Signature set satisfies policy /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.290 UTC [policies] Evaluate -> DEBU 4df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy"
orderer0.example.com | "2019-05-02 09:27:14.290 UTC [common.configtx] verifyDeltaSet -> DEBU 4e0 Processing change to key: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.290 UTC [common.configtx] recurseConfigMap -> DEBU 4e1 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e2 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3eb Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.pull] HandleMessage -> DEBU 3ec GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ed Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [msp.identity] Verify -> DEBU 3f0 Verify: digest = 00000000 0e 94 37 97 d8 d4 39 f6 63 9b 66 fd 53 8e c5 11 |..7...9.c.f.S...|
peer0.org1.example.com | 00000010 be 9d b7 fc c4 3a a9 5e 30 77 cb 08 a6 cc e1 29 |.....:.^0w.....)|"
peer0.org1.example.com | "2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f1 Verify: sig = 00000000 30 44 02 20 3c 60 f3 75 6c c8 c4 74 dd c8 61 b7 |0D. <`.ul..t..a.|
peer0.org1.example.com | 00000010 a3 9b 28 51 86 57 e0 e9 9f f8 af 37 14 41 61 62 |..(Q.W.....7.Aab|
peer0.org1.example.com | 00000020 e0 e6 42 d6 02 20 4b 7f c3 5e 82 f7 53 19 e9 1d |..B.. K..^..S...|
peer0.org1.example.com | 00000030 f3 85 00 23 ca 69 71 21 5f 74 28 da 36 65 41 9c |...#.iq!_t(.6eA.|
peer0.org1.example.com | 00000040 d6 e6 0a 68 db 24 |...h.$|"
peer0.org1.example.com | "2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:21.078 UTC [msp.identity] Verify -> DEBU 3f3 Verify: sig = 00000000 30 45 02 21 00 e7 53 0a 9a 72 26 2a b8 18 0f e4 |0E.!..S..r&*....|
peer0.org1.example.com | 00000010 51 be 3c 11 c6 70 fd 36 a1 7a ae f6 a8 97 c9 55 |Q.<..p.6.z.....U|
peer0.org1.example.com | 00000020 16 4f ef 17 7b 02 20 5b bf ca 5c 5a 34 da 75 8b |.O..{. [..\Z4.u.|
peer0.org1.example.com | 00000030 36 92 ff 1a 2c b5 19 c8 e6 0e 9e 79 a0 fb 49 04 |6...,......y..I.|
peer0.org1.example.com | 00000040 d7 99 5c 67 50 01 93 |..\gP..|"
peer0.org1.example.com | "2019-05-02 09:27:21.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.080 UTC [gossip.discovery] isSentByMe -> DEBU 3f5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.115 UTC [gossip.gossip] handleMessage -> DEBU 3f8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:15182899176340217669 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.pull] HandleMessage -> DEBU 3f9 GossipMessage: tag:EMPTY hello:<nonce:15182899176340217669 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.pull] SendDigest -> DEBU 3fa Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.gossip] handleMessage -> DEBU 3fb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 3fc Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 3ff Verify: digest = 00000000 3c d2 ae 36 98 38 d6 fb 44 e5 ff 16 21 78 36 7c |<..6.8..D...!x6||
peer0.org1.example.com | 00000010 91 7a b7 92 d5 93 28 23 98 f8 70 a5 44 73 c8 20 |.z....(#..p.Ds. |"
peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 400 Verify: sig = 00000000 30 44 02 20 19 cd 84 14 7c 45 5e 5f 42 0e fc 7a |0D. ....|E^_B..z|
peer0.org1.example.com | 00000010 de 0c 36 fb 21 e1 2c 87 80 82 4f 5b c3 00 62 26 |..6.!.,...O[..b&|
peer0.org1.example.com | 00000020 37 18 b5 f1 02 20 39 00 da 84 4b b9 8a 1d 90 6c |7.... 9...K....l|
peer0.org1.example.com | 00000030 4f 37 4b 30 99 44 56 b8 ef 72 01 43 b5 d3 c8 e9 |O7K0.DV..r.C....|
peer0.org1.example.com | 00000040 ec 5f a3 34 fa 3c |._.4.<|"
peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 401 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [msp.identity] Verify -> DEBU 402 Verify: sig = 00000000 30 45 02 21 00 c2 1d 04 10 d6 df 07 2a 8a 67 66 |0E.!........*.gf|
peer0.org1.example.com | 00000010 2f 24 20 3e d5 7c 5e 31 93 1b 25 4a 71 99 10 2d |/$ >.|^1..%Jq..-|
peer0.org1.example.com | 00000020 21 c0 56 be 83 02 20 2f c8 13 bb 2b 84 1f dd 9a |!.V... /...+....|
peer0.org1.example.com | 00000030 c5 b0 04 af 8e 26 09 e2 d0 22 1d 64 e1 e5 b2 2e |.....&...".d....|
peer0.org1.example.com | 00000040 c7 ab ff 9f f0 11 bc |.......|"
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f2 Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f3 Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f4 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f5 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f6 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f7 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4fe Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 501 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] Validate -> DEBU 505 Anchor peers for org Org1MSP are "
orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] validateMSP -> DEBU 506 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] newBccspMsp -> DEBU 507 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] New -> DEBU 508 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] Setup -> DEBU 509 Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] handleAliveMessage -> DEBU 403 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 404 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 405 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 "
peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 406 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 "
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 407 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 408 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 409 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40b Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] Send -> DEBU 40c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40d Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 410 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:21.284 UTC [gossip.channel] reportMembershipChanges -> INFO 411 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]"
peer0.org1.example.com | "2019-05-02 09:27:22.328 UTC [gossip.election] waitForInterrupt -> DEBU 412 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.329 UTC [gossip.election] beLeader -> INFO 413 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader"
peer0.org1.example.com | "2019-05-02 09:27:22.329 UTC [gossip.service] func1 -> INFO 414 Elected as a leader, starting delivery service for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.331 UTC [deliveryClient] StartDeliverForChannel -> DEBU 415 This peer will pass blocks from orderer service to other peers for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [gossip.election] leaderElection -> DEBU 416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [ConnProducer] NewConnection -> DEBU 417 Creating a new connection"
peer0.org1.example.com | "2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 418 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 419 scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] UpdateState -> DEBU 41a ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] switchBalancer -> DEBU 41b ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] HandleSubConnStateChange -> DEBU 41c pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [gossip.election] IsLeader -> DEBU 41d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:22.338 UTC [msp.identity] Sign -> DEBU 41e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510021801 "
peer0.org1.example.com | "2019-05-02 09:27:22.339 UTC [msp.identity] Sign -> DEBU 41f Sign: digest: 60FC0EDC70A832CF6DF96F5563D02DBB555FDCF61BF2B6A8AF9231771DFA2140 "
peer0.org1.example.com | "2019-05-02 09:27:22.339 UTC [gossip.election] waitForInterrupt -> DEBU 420 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:22.342 UTC [grpc] HandleSubConnStateChange -> DEBU 421 pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, READY"
peer0.org1.example.com | "2019-05-02 09:27:22.342 UTC [gossip.comm] Send -> DEBU 422 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 423 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 425 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [ConnProducer] NewConnection -> DEBU 424 Connected to orderer1.example.com:7050"
peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [deliveryClient] connect -> DEBU 426 Connected to orderer1.example.com:7050"
peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] connect -> DEBU 427 Establishing gRPC stream with orderer1.example.com:7050 ..."
peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] afterConnect -> DEBU 428 Entering"
peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] RequestBlocks -> DEBU 429 Starting deliver with block [1] for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42a Sign: plaintext: 0A91070A3D08051A0608FAEFAAE60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 "
peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42b Sign: digest: E5C7564D501A5B1C04CAF6AD5E5AE6F2DAB2D795A5C6261A95AD6BDB3D38E8AB "
peer0.org1.example.com | "2019-05-02 09:27:22.345 UTC [deliveryClient] afterConnect -> DEBU 42c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.350 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.351 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42e Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.351 UTC [policies] Evaluate -> DEBU 42f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp.identity] newIdentity -> DEBU 50a Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.295 UTC [msp.identity] newIdentity -> DEBU 50b Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 50c Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] Validate -> DEBU 50d MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 50e MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] hasOURole -> DEBU 50f MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 510 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 511 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 512 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 513 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 514 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] Validate -> DEBU 515 Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] validateMSP -> DEBU 516 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] newBccspMsp -> DEBU 517 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] New -> DEBU 518 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] Setup -> DEBU 519 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51a Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 430 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 431 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [msp] DeserializeIdentity -> DEBU 432 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.353 UTC [msp.identity] newIdentity -> DEBU 433 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI
peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO
peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA
peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM
peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q
peer0.org1.example.com | 1A==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.353 UTC [cauthdsl] func1 -> DEBU 434 0xc002f26f50 gate 1556789242353952600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 435 0xc002f26f50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 436 0xc002f26f50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 437 Checking if identity satisfies MEMBER role for OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:22.355 UTC [msp] Validate -> DEBU 438 MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.355 UTC [cauthdsl] func2 -> DEBU 439 0xc002f26f50 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.356 UTC [msp.identity] Verify -> DEBU 43a Verify: digest = 00000000 56 2e 33 96 85 a9 52 2d c2 1a a7 20 42 3a b0 10 |V.3...R-... B:..|
peer0.org1.example.com | 00000010 ec d7 75 f9 75 94 ee 5d 14 d1 ee bc 56 2b fa 37 |..u.u..]....V+.7|"
peer0.org1.example.com | "2019-05-02 09:27:22.357 UTC [msp.identity] Verify -> DEBU 43b Verify: sig = 00000000 30 44 02 20 3d f7 5b a0 eb 92 62 41 d4 01 2b e4 |0D. =.[...bA..+.|
peer0.org1.example.com | 00000010 90 4e 76 27 54 d2 a8 28 18 32 87 13 a7 84 83 58 |.Nv'T..(.2.....X|
peer0.org1.example.com | 00000020 53 34 90 f8 02 20 2c a7 c8 04 84 af 33 47 ac c9 |S4... ,.....3G..|
peer0.org1.example.com | 00000030 32 af 26 5b a6 ea c1 f4 12 7a 24 21 9e dc 4b aa |2.&[.....z$!..K.|
peer0.org1.example.com | 00000040 c7 a8 6a d4 17 c4 |..j...|"
peer0.org1.example.com | "2019-05-02 09:27:22.357 UTC [cauthdsl] func2 -> DEBU 43c 0xc002f26f50 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [cauthdsl] func1 -> DEBU 43d 0xc002f26f50 gate 1556789242353952600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 440 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 441 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [blocksProvider] DeliverBlocks -> DEBU 442 [businesschannel] Adding payload to local buffer, blockNum = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [gossip.state] addPayload -> DEBU 443 [businesschannel] Adding payload to local buffer, blockNum = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] addPayload -> DEBU 444 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 445 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 447 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> INFO 448 [businesschannel] Received block [1] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> DEBU 449 [businesschannel] Validating block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44a [businesschannel] START Block Validation for block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44b expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] validateTx -> DEBU 44c [businesschannel] validateTx starts for block 0xc002e28c00 env 0xc002ef2af0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44d ValidateTransactionEnvelope starts for envelope 0xc002ef2af0"
peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44e Header is channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" "
peer0.org1.example.com | "2019-05-02 09:27:22.362 UTC [protoutils] validateChannelHeader -> DEBU 44f validateChannelHeader info: header type 1"
peer0.org1.example.com | "2019-05-02 09:27:22.362 UTC [protoutils] checkSignatureFromCreator -> DEBU 450 begin"
peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [blocksProvider] DeliverBlocks -> DEBU 446 [businesschannel] Gossiping block [1], peers number [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp] GetManagerForChain -> DEBU 451 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp] DeserializeIdentity -> DEBU 453 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp.identity] newIdentity -> DEBU 454 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51b Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.299 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 51c Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.299 UTC [msp] Validate -> DEBU 51d MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 51e MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] hasOURole -> DEBU 51f MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 520 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] NewStandardValues -> DEBU 521 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 527 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 528 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 529 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 52a Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52b Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] validateMSP -> DEBU 52c Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.302 UTC [msp] newBccspMsp -> DEBU 52d Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp] New -> DEBU 52e Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp] Setup -> DEBU 52f Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.304 UTC [msp.identity] newIdentity -> DEBU 531 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.304 UTC [msp] Validate -> DEBU 532 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 533 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 534 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 535 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 536 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 546 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 547 Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 548 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 549 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54a Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54b Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
peer0.org1.example.com | QQ==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [protoutils] checkSignatureFromCreator -> DEBU 455 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}"
peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp] Validate -> DEBU 456 MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [protoutils] checkSignatureFromCreator -> DEBU 457 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.|
peer0.org1.example.com | 00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|"
peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....|
peer0.org1.example.com | 00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L|
peer0.org1.example.com | 00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....|
peer0.org1.example.com | 00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.|
peer0.org1.example.com | 00000040 1a 33 13 1f 94 5f 84 |.3..._.|"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 45a exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [gossip.channel] AddToMsgStore -> DEBU 452 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [gossip.pull] Add -> DEBU 45b Added 1, total items: 1"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [protoutils] validateConfigTransaction -> DEBU 45c validateConfigTransaction starts for data 0xc002f98000, header channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" "
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [committer.txvalidator] validateTx -> DEBU 45d Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 45e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 460 Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 467 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 46a 0xc002f84fb0 gate 1556789242366080600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46c 0xc002f84fb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46e 0xc002f84fb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 470 0xc002f84fb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 472 Verify: digest = 00000000 24 2f 50 1d 36 ee 86 46 81 38 f5 a7 f3 b1 12 09 |$/P.6..F.8......|
peer0.org1.example.com | 00000010 e6 b4 df ef e6 de ed 34 9a 91 5c e0 f0 75 a8 4b |.......4..\..u.K|"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 474 Verify: sig = 00000000 30 45 02 21 00 86 af 4e 12 bd d7 84 85 43 85 8a |0E.!...N.....C..|
peer0.org1.example.com | 00000010 c4 f3 fb 2b 06 92 44 1f 82 96 dd 9a 9e f0 cf d9 |...+..D.........|
peer0.org1.example.com | 00000020 19 33 c0 99 ef 02 20 26 fd 78 05 2e 72 8f 1b d7 |.3.... &.x..r...|
peer0.org1.example.com | 00000030 30 ee bf b3 95 48 b9 16 15 ba cd d3 ec aa 24 2d |0....H........$-|
peer0.org1.example.com | 00000040 1f 08 b8 c8 d1 f5 7f |.......|"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 478 0xc002f84fb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 47a 0xc002f84fb0 gate 1556789242366080600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 578 Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 579 Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.common.cluster] NewStream -> DEBU 57a Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10"
orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 57b Sending msg of 24744 bytes to 3 on channel testchainid took 863.7µs"
orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.common.cluster.step] sendMessage -> DEBU 57c Send of SubmitRequest for channel testchainid with payload of size 24744 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs "
orderer0.example.com | "2019-05-02 09:27:14.314 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 57d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57140"
orderer0.example.com | "2019-05-02 09:27:14.317 UTC [orderer.common.broadcast] Handle -> DEBU 57e Received EOF from 172.18.0.8:57140, hangup"
orderer0.example.com | "2019-05-02 09:27:14.317 UTC [orderer.common.server] func1 -> DEBU 57f Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:14.317 UTC [comm.grpc.server] 1 -> INFO 580 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57140 grpc.code=OK grpc.call_duration=164.0761ms
orderer0.example.com | "2019-05-02 09:27:14.318 UTC [common.deliver] deliverBlocks -> DEBU 581 Rejecting deliver for 172.18.0.8:57138 because channel businesschannel not found"
orderer0.example.com | "2019-05-02 09:27:14.318 UTC [orderer.common.server] func1 -> DEBU 582 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:14.318 UTC [comm.grpc.server] 1 -> INFO 583 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57138 grpc.code=OK grpc.call_duration=193.6519ms
orderer0.example.com | "2019-05-02 09:27:14.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 584 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 24953"
orderer0.example.com | "2019-05-02 09:27:14.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 585 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:14.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 586 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs"
orderer0.example.com | "2019-05-02 09:27:14.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 587 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.1µs "
orderer0.example.com | "2019-05-02 09:27:14.351 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 588 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs"
orderer0.example.com | "2019-05-02 09:27:14.352 UTC [orderer.common.cluster.step] sendMessage -> DEBU 589 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs "
orderer0.example.com | "2019-05-02 09:27:14.352 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 58a Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1
orderer0.example.com | "2019-05-02 09:27:14.353 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:14.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58d Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.355 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:14.356 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.356 UTC [common.channelconfig] NewStandardValues -> DEBU 591 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 592 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 593 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 594 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 596 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 597 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 598 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.360 UTC [common.channelconfig] NewStandardValues -> DEBU 599 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.358 UTC [orderer.common.server] Deliver -> DEBU 595 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:14.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59a Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.channelconfig] NewStandardValues -> DEBU 59b Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.361 UTC [common.deliver] Handle -> DEBU 59c Starting new deliver loop for 172.18.0.8:57142"
orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59d Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.363 UTC [common.channelconfig] validateMSP -> DEBU 59e Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.364 UTC [msp] newBccspMsp -> DEBU 5a0 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.364 UTC [msp] New -> DEBU 5a1 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.deliver] Handle -> DEBU 59f Attempting to read seek info message from 172.18.0.8:57142"
orderer0.example.com | "2019-05-02 09:27:14.365 UTC [msp] Setup -> DEBU 5a2 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:14.366 UTC [msp.identity] newIdentity -> DEBU 5a3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] verifyDeltaSet -> DEBU 47e Processing change to key: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47f Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] policyForItem -> DEBU 480 Getting policy for item Org1MSP with mod_policy Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 481 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 482 Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 483 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 484 [businesschannel] Adding payload to local buffer, blockNum = [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 485 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 486 [businesschannel] Adding payload to local buffer, blockNum = [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 487 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 488 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 489 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48a Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 48b [businesschannel] Gossiping block [2], peers number [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48c Manager Channel/Application looking up path [Org1MSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48d Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48e Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48f Manager Channel/Application/Org1MSP looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.channel] AddToMsgStore -> DEBU 490 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 491 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.pull] Add -> DEBU 492 Added 2, total items: 2"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 493 0xc003007140 gate 1556789242367018200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 494 0xc003007140 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 495 0xc003007140 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 496 Checking if identity satisfies ADMIN role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 497 0xc003007140 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 498 Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..|
peer0.org1.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 499 Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.|
peer0.org1.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$|
peer0.org1.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.|
peer0.org1.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..|
peer0.org1.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 49a 0xc003007140 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 49b 0xc003007140 gate 1556789242367018200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [policies] Evaluate -> DEBU 49c Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.368 UTC [policies] Evaluate -> DEBU 49d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.368 UTC [common.configtx] verifyDeltaSet -> DEBU 49e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 49f Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a0 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a1 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a2 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a3 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a4 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a5 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a6 Setting policy for key Readers to "
peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a7 Setting policy for key Writers to "
peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a8 Setting policy for key Admins to "
peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a9 Setting policy for key Endorsement to "
peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4aa Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ab Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ac Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.372 UTC [common.configtx] recurseConfigMap -> DEBU 4ad Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4ae Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4af Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4b0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b1 Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b2 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b5 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b6 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b9 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.378 UTC [common.channelconfig] NewStandardValues -> DEBU 4bc Initializing protos for *channelconfig.ChannelProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.378 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bd Processing field: HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4be Processing field: BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bf Processing field: OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c0 Processing field: Consortium"
peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] NewStandardValues -> DEBU 4c2 Initializing protos for *channelconfig.ApplicationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: ACLs"
peer0.org1.example.com | "2019-05-02 09:27:22.381 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.382 UTC [common.channelconfig] NewStandardValues -> DEBU 4c5 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.383 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.384 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.384 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.385 UTC [common.channelconfig] Validate -> DEBU 4c9 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
peer0.org1.example.com | "2019-05-02 09:27:22.385 UTC [common.channelconfig] validateMSP -> DEBU 4ca Setting up MSP for org Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.386 UTC [msp] newBccspMsp -> DEBU 4cb Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.386 UTC [msp] New -> DEBU 4cc Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.387 UTC [msp] Setup -> DEBU 4cd Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.387 UTC [msp.identity] newIdentity -> DEBU 4ce Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.389 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.367 UTC [msp.identity] newIdentity -> DEBU 5a4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.368 UTC [msp] Validate -> DEBU 5a5 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] NewStandardValues -> DEBU 5a6 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a7 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a8 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.370 UTC [common.channelconfig] NewStandardValues -> DEBU 5a9 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:14.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5aa Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.374 UTC [common.channelconfig] NewStandardValues -> DEBU 5ab Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ac Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.377 UTC [common.channelconfig] Validate -> DEBU 5ad Anchor peers for org Org1MSP are "
orderer0.example.com | "2019-05-02 09:27:14.378 UTC [common.channelconfig] validateMSP -> DEBU 5ae Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] newBccspMsp -> DEBU 5af Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] New -> DEBU 5b0 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] Setup -> DEBU 5b1 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.381 UTC [msp.identity] newIdentity -> DEBU 5b2 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.384 UTC [msp.identity] newIdentity -> DEBU 5b3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5b4 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.386 UTC [msp] Validate -> DEBU 5b5 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.386 UTC [msp] getCertificationChain -> DEBU 5b6 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.387 UTC [msp] hasOURole -> DEBU 5b7 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.387 UTC [msp] getCertificationChain -> DEBU 5b8 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5b9 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d0 Checking if identity satisfies role [CLIENT] for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] Validate -> DEBU 4d1 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] getCertificationChain -> DEBU 4d2 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.392 UTC [msp] hasOURole -> DEBU 4d3 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ba Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5bb Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bc Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] Validate -> DEBU 5bd Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] validateMSP -> DEBU 5be Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] newBccspMsp -> DEBU 5bf Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] New -> DEBU 5c0 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] Setup -> DEBU 5c1 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c2 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c4 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] Validate -> DEBU 5c5 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c6 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] hasOURole -> DEBU 5c7 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c8 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5c9 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5ca MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cb Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cc Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.394 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dc Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dd Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5de Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5df Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.400 UTC [policies] NewManagerImpl -> DEBU 5e0 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [policies] NewManagerImpl -> DEBU 5e1 Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.392 UTC [msp] getCertificationChain -> DEBU 4d4 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d5 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d7 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] Validate -> DEBU 4d9 Anchor peers for org Org2MSP are "
peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] validateMSP -> DEBU 4da Setting up MSP for org Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.395 UTC [msp] newBccspMsp -> DEBU 4db Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.395 UTC [msp] New -> DEBU 4dc Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.407 UTC [msp] Setup -> DEBU 4dd Setting up MSP instance Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.408 UTC [comm.grpc.server] 1 -> INFO 4de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.408Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.6µs
peer0.org1.example.com | "2019-05-02 09:27:22.409 UTC [msp.identity] newIdentity -> DEBU 4df Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.411 UTC [msp.identity] Sign -> DEBU 4e0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.412 UTC [msp.identity] Sign -> DEBU 4e1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e2 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53216"
peer0.org1.example.com | "2019-05-02 09:27:22.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e3 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53216"
peer0.org1.example.com | "2019-05-02 09:27:22.416 UTC [msp.identity] Verify -> DEBU 4e4 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:22.417 UTC [msp.identity] Verify -> DEBU 4e5 Verify: sig = 00000000 30 44 02 20 01 3a fc 5f 3d 11 c1 39 9c 3f 62 dc |0D. .:._=..9.?b.|
peer0.org1.example.com | 00000010 34 d7 79 8e ec 78 df 57 4b 3c ab ec 2d 9b 93 b4 |4.y..x.WK<..-...|
peer0.org1.example.com | 00000020 21 fa 7d 9b 02 20 65 c0 70 63 b0 34 15 dc b9 94 |!.}.. e.pc.4....|
peer0.org1.example.com | 00000030 3d fb 65 34 11 09 7e a4 c3 d8 83 cf 58 73 03 d0 |=.e4..~.....Xs..|
peer0.org1.example.com | 00000040 7a e3 37 96 05 04 |z.7...|"
peer0.org1.example.com | "2019-05-02 09:27:22.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e6 Authenticated 172.18.0.6:53216"
peer0.org1.example.com | "2019-05-02 09:27:22.419 UTC [gossip.comm] GossipStream -> DEBU 4e7 Servicing 172.18.0.6:53216"
peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [gossip.comm] serviceConnection -> DEBU 4e8 Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [gossip.comm] func2 -> DEBU 4e9 Client 172.18.0.6:53164 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [comm.grpc.server] 1 -> INFO 4ea streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.2584929s
peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] writeToStream -> DEBU 4eb Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] serviceConnection -> DEBU 4ec Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] func2 -> DEBU 4ed Client 172.18.0.6:53216 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [comm.grpc.server] 1 -> INFO 4ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.411Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.9769ms
peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [msp.identity] newIdentity -> DEBU 4ef Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:14.411 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.412 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.413 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:14.430 UTC [common.channelconfig] LogSanityChecks -> DEBU 60e As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:14.433 UTC [common.channelconfig] LogSanityChecks -> DEBU 60f As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:14.434 UTC [policies] Manager -> DEBU 610 Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 612 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 613 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:14.437 UTC [policies] Manager -> DEBU 615 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 616 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 617 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:27:14.438 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:27:14.438 UTC [policies] Manager -> DEBU 619 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:14.439 UTC [policies] Manager -> DEBU 61a Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61b Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61c Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:14.442 UTC [policies] Manager -> DEBU 61d Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.442 UTC [common.channelconfig] LogSanityChecks -> DEBU 61e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:14.442 UTC [common.capabilities] Supported -> DEBU 61f Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:14.443 UTC [common.capabilities] Supported -> DEBU 620 Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:14.443 UTC [fsblkstorage] newBlockfileMgr -> DEBU 621 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel "
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.422 UTC [gossip.comm] writeToStream -> DEBU 4f0 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.422 UTC [gossip.comm] readFromStream -> DEBU 4f1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:27:22.425 UTC [grpc] infof -> DEBU 4f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [grpc] infof -> DEBU 4f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies role [CLIENT] for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [msp] Validate -> DEBU 4f5 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f6 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] hasOURole -> DEBU 4f7 MSP Org2MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f8 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 4f9 Initializing protos for *channelconfig.OrdererProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: KafkaBrokers"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 500 Initializing protos for *channelconfig.OrdererOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: Endpoints"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 502 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 503 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] validateMSP -> DEBU 504 Setting up MSP for org OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] newBccspMsp -> DEBU 505 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] New -> DEBU 506 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] Setup -> DEBU 507 Setting up MSP instance OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 508 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 509 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Validate -> DEBU 50a MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50b Setting up the MSP manager (3 msps)"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50c MSP manager setup complete, setup 3 msps"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Readers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy Writers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Admins for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Endorsement for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Admins for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Endorsement for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Readers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Writers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Endorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 516 Proposed new policy Readers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Writers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 518 Proposed new policy Admins for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 519 Proposed new policy LifecycleEndorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51a Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:14.444 UTC [kvledger.util] CreateDirIfMissing -> DEBU 622 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]"
orderer0.example.com | "2019-05-02 09:27:14.444 UTC [kvledger.util] logDirStatus -> DEBU 623 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist"
orderer0.example.com | "2019-05-02 09:27:14.445 UTC [kvledger.util] logDirStatus -> DEBU 624 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists"
orderer0.example.com | "2019-05-02 09:27:14.445 UTC [fsblkstorage] newBlockfileMgr -> INFO 625 Getting block information from block storage"
orderer0.example.com | "2019-05-02 09:27:14.445 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 626 Retrieving checkpoint info from block files"
orderer0.example.com | "2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 627 retrieveLastFileSuffix()"
orderer0.example.com | "2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 628 retrieveLastFileSuffix() - biggestFileNum = -1"
orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 629 Last file number found = -1"
orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62a No block file found"
orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] newBlockfileMgr -> DEBU 62b Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00040b220)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])"
orderer0.example.com | "2019-05-02 09:27:14.450 UTC [fsblkstorage] newBlockIndex -> DEBU 62c newBlockIndex() - indexItems:[[BlockNum]]"
orderer0.example.com | "2019-05-02 09:27:14.451 UTC [orderer.common.server] func1 -> DEBU 62d Executing callback to update root CAs"
orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62e updating root CAs for channel [businesschannel]"
orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62f adding app root CAs for MSP [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 630 adding orderer root CAs for MSP [OrdererMSP]"
orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 631 adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:14.457 UTC [fsblkstorage] indexBlock -> DEBU 632 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets=
orderer0.example.com | txId= locPointer=offset=39, bytesLength=23894
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:14.461 UTC [fsblkstorage] updateCheckpoint -> DEBU 633 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23938], isChainEmpty=[false], lastBlockNumber=[0]"
orderer0.example.com | "2019-05-02 09:27:14.462 UTC [fsblkstorage] Next -> DEBU 634 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 635 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 636 Remaining bytes=[23938], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 637 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:14.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 638 blockbytes [23935] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:14.464 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 639 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)"
orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 63a EvictionSuspicion not set, defaulting to 10m0s"
orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63b No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 63c No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.472 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 63d Loading WAL at Term 0 and Index 0" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63e Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63f Appending 0 entries to memory storage" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.474 UTC [fsblkstorage] Next -> DEBU 640 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:14.474 UTC [fsblkstorage] newBlockfileStream -> DEBU 641 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 642 Remaining bytes=[23938], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 643 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:14.476 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 644 blockbytes [23935] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:14.477 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 645 [channel: businesschannel] Done creating channel support resources"
orderer0.example.com | "2019-05-02 09:27:14.478 UTC [orderer.commmon.multichannel] newChain -> INFO 646 Created and starting new chain businesschannel"
orderer0.example.com | "2019-05-02 09:27:14.478 UTC [orderer.consensus.etcdraft] Start -> INFO 647 Starting Raft node" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.479 UTC [orderer.common.cluster] Configure -> INFO 648 Entering, channel: businesschannel, nodes: [ID: 3,
orderer0.example.com | Endpoint: orderer2.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Writers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Admins for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy BlockValidation for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy Readers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Writers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 520 Proposed new policy Admins for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Writers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Admins for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Group] /Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Value] /Channel/Orderer/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Orderer/BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Policy] /Channel/Orderer/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Orderer/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Value] /Channel/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Value] /Channel/HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Value] /Channel/Consortium"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Value] /Channel/BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 551 As expected, current configuration has policy '/Channel/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 552 As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | ID: 2,
orderer0.example.com | Endpoint: orderer1.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:14.479 UTC [orderer.common.cluster] updateStubInMapping -> INFO 649 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel"
orderer0.example.com | "2019-05-02 09:27:14.480 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64a Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change"
orderer0.example.com | "2019-05-02 09:27:14.481 UTC [orderer.common.cluster] func1 -> DEBU 64b Connecting to ID: 3,
orderer0.example.com | Endpoint: orderer2.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2
orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg
orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | for channel businesschannel"
orderer0.example.com | "2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel"
orderer0.example.com | "2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change"
orderer0.example.com | "2019-05-02 09:27:14.483 UTC [orderer.common.cluster] func1 -> DEBU 64e Connecting to ID: 2,
orderer0.example.com | Endpoint: orderer1.example.com:7050,
orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE-----
orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 553 Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 554 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 555 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 556 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 557 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 558 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 559 As expected, current configuration has policy '/Channel/Application/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55a As expected, current configuration has policy '/Channel/Application/Writers'"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55b As expected, current configuration has policy '/Channel/Application/Admins'"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55c Manager Channel looking up path [Orderer]"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55d Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55e Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55f Manager Channel/Orderer looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Manager -> DEBU 560 Manager Channel/Orderer has managers OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 561 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 562 Application capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 563 Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 564 Processing new config for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 565 Calling out because config was updated for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 566 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 567 Org2MSP anchor peers: []"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 568 Creating state provider for chainID businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 569 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func1 -> DEBU 56e 0xc00317e000 gate 1556789242437610900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 56f 0xc00317e000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 570 0xc00317e000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 571 0xc00317e000 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [msp.identity] Verify -> DEBU 572 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h|
peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y<vd...|"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [msp.identity] Verify -> DEBU 573 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....|
peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b|
peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..|
peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.|
peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|"
peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 574 0xc00317e000 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [cauthdsl] func1 -> DEBU 575 0xc00317e000 gate 1556789242437610900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 576 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 577 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 578 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] JoinChan -> INFO 57a Joining gossip network of channel businesschannel with 2 organizations"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57b Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57c Anchor peer with same endpoint, skipping connecting to myself"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57d No configured anchor peers of Org2MSP for channel businesschannel to learn about"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.service] updateEndpoints -> DEBU 57e Updating endpoints for chainID%!(EXTRA string=businesschannel)"
peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [peer] updateTrustedRoots -> DEBU 57f Updating trusted root authorities for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.461 UTC [peer] buildTrustedRootsForChain -> DEBU 580 updating root CAs for channel [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 581 adding app root CAs for MSP [Org1MSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org2MSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding orderer root CAs for MSP [OrdererMSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.463 UTC [committer.txvalidator] validateTx -> DEBU 584 config transaction received for chain businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.466 UTC [committer.txvalidator] Validate -> DEBU 585 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:22.468 UTC [committer.txvalidator] Validate -> INFO 586 [businesschannel] Validated block [1] in 107ms"
peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [gossip.privdata] listMissingPrivateData -> DEBU 587 Retrieving private write sets for 0 transactions from transient store"
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l
orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ
orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh
orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49
orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI
orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/
orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E
orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5
orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq
orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC
orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=
orderer0.example.com | -----END CERTIFICATE-----
orderer0.example.com | for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [gossip.privdata] StoreBlock -> DEBU 588 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [committer] preCommit -> DEBU 589 Received configuration update, calling CSCC ConfigUpdate"
peer0.org1.example.com | "2019-05-02 09:27:22.470 UTC [kvledger] CommitWithPvtData -> DEBU 58b [businesschannel] Validating state for block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58c Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:22.465 UTC [committer.txvalidator] validateTx -> DEBU 58a [businesschannel] validateTx completes for block 0xc002e28c00 env 0xc002ef2af0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:22.472 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.472 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 58f ValidateAndPrepareBatch() for block number = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] preprocessProtoBlock -> DEBU 591 txType=CONFIG"
peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] processNonEndorserTx -> DEBU 592 Performing custom processing for transaction [txid=], [txType=CONFIG]"
peer0.org1.example.com | "2019-05-02 09:27:22.474 UTC [valimpl] processNonEndorserTx -> DEBU 593 Processor for custom tx processing:&peer.configtxProcessor{}"
peer0.org1.example.com | "2019-05-02 09:27:22.474 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 594 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:22.479 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []"
peer0.org1.example.com | "2019-05-02 09:27:22.480 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG"
peer0.org1.example.com | "2019-05-02 09:27:22.479 UTC [comm.grpc.server] 1 -> INFO 595 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.478Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.5µs
orderer0.example.com | "2019-05-02 09:27:14.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 64f 3 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 650 2 exists in both old and new membership for channel businesschannel , skipping its deactivation"
orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.common.cluster] Configure -> INFO 651 Exiting"
orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.consensus.etcdraft] start -> DEBU 652 Starting raft node: #peers: 3" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] start -> INFO 653 Starting raft node as part of a new channel" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 654 1 became follower at term 0" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] newRaft -> INFO 655 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 656 1 became follower at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] run -> INFO 657 This node is picked to start campaign" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 658 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0"
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 659 Sign: plaintext: 0A00120B0A090A03010203100418050A...EC9F6749FC7E927080D6D099F3419E8C "
orderer0.example.com | "2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 65a Sign: digest: 68557D82A654C101CD7E3C9A16564FC0776386EE1C49877DE775BE6229627D91 "
orderer0.example.com | "2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65b Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65c Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.491 UTC [orderer.consensus.etcdraft] apply -> INFO 65d Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:14.493 UTC [fsblkstorage] indexBlock -> DEBU 65e Indexing block [blockNum=1, blockHash=[]byte{0x90, 0x42, 0xb2, 0x46, 0xc4, 0xef, 0xd2, 0xf1, 0xe5, 0x46, 0xcb, 0x7a, 0xee, 0xd9, 0x2e, 0x77, 0xf, 0x7a, 0xe4, 0x58, 0xf1, 0x9e, 0x66, 0x4b, 0x8d, 0xb8, 0x2d, 0x23, 0xd8, 0xf7, 0x76, 0x5d} txOffsets=
orderer0.example.com | txId= locPointer=offset=71, bytesLength=24824
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:14.496 UTC [fsblkstorage] updateCheckpoint -> DEBU 65f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44241], isChainEmpty=[false], lastBlockNumber=[1]"
orderer0.example.com | "2019-05-02 09:27:14.497 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 660 [channel: testchainid] Wrote block [1]"
orderer0.example.com | "2019-05-02 09:27:14.560 UTC [common.deliver] deliverBlocks -> WARN 661 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57142 because of consenter error"
orderer0.example.com | "2019-05-02 09:27:14.560 UTC [orderer.common.server] func1 -> DEBU 662 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:14.561 UTC [comm.grpc.server] 1 -> INFO 663 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57142 grpc.code=OK grpc.call_duration=203.5441ms
orderer0.example.com | "2019-05-02 09:27:14.577 UTC [orderer.common.server] Deliver -> DEBU 664 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 665 Starting new deliver loop for 172.18.0.8:57144"
orderer0.example.com | "2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 666 Attempting to read seek info message from 172.18.0.8:57144"
orderer0.example.com | "2019-05-02 09:27:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 667 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:14.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 668 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs"
orderer0.example.com | "2019-05-02 09:27:14.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 669 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs "
orderer0.example.com | "2019-05-02 09:27:14.778 UTC [common.deliver] deliverBlocks -> WARN 66a [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57144 because of consenter error"
orderer0.example.com | "2019-05-02 09:27:14.779 UTC [orderer.common.server] func1 -> DEBU 66b Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:14.779 UTC [comm.grpc.server] 1 -> INFO 66c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57144 grpc.code=OK grpc.call_duration=201.4329ms
orderer0.example.com | "2019-05-02 09:27:14.797 UTC [orderer.common.server] Deliver -> DEBU 66d Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66e Starting new deliver loop for 172.18.0.8:57146"
orderer0.example.com | "2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66f Attempting to read seek info message from 172.18.0.8:57146"
orderer0.example.com | "2019-05-02 09:27:14.997 UTC [common.deliver] deliverBlocks -> WARN 670 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57146 because of consenter error"
orderer0.example.com | "2019-05-02 09:27:14.998 UTC [orderer.common.server] func1 -> DEBU 671 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:15.000 UTC [comm.grpc.server] 1 -> INFO 672 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57146 grpc.code=OK grpc.call_duration=202.9803ms
orderer0.example.com | "2019-05-02 09:27:15.019 UTC [orderer.common.server] Deliver -> DEBU 673 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 674 Starting new deliver loop for 172.18.0.8:57148"
orderer0.example.com | "2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 675 Attempting to read seek info message from 172.18.0.8:57148"
orderer0.example.com | "2019-05-02 09:27:15.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 676 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 677 Sending msg of 28 bytes to 3 on channel testchainid took 34.7µs"
orderer0.example.com | "2019-05-02 09:27:15.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 678 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.2µs "
orderer0.example.com | "2019-05-02 09:27:15.220 UTC [common.deliver] deliverBlocks -> WARN 679 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57148 because of consenter error"
orderer0.example.com | "2019-05-02 09:27:15.220 UTC [orderer.common.server] func1 -> DEBU 67a Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:15.220 UTC [comm.grpc.server] 1 -> INFO 67b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57148 grpc.code=OK grpc.call_duration=201.4772ms
orderer0.example.com | "2019-05-02 09:27:15.238 UTC [orderer.common.server] Deliver -> DEBU 67c Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67d Starting new deliver loop for 172.18.0.8:57150"
orderer0.example.com | "2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67e Attempting to read seek info message from 172.18.0.8:57150"
orderer0.example.com | "2019-05-02 09:27:15.442 UTC [common.deliver] deliverBlocks -> WARN 67f [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57150 because of consenter error"
orderer0.example.com | "2019-05-02 09:27:15.443 UTC [orderer.common.server] func1 -> DEBU 680 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:15.443 UTC [comm.grpc.server] 1 -> INFO 681 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57150 grpc.code=OK grpc.call_duration=206.8682ms
orderer0.example.com | "2019-05-02 09:27:15.463 UTC [orderer.common.server] Deliver -> DEBU 682 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:15.464 UTC [common.deliver] Handle -> DEBU 683 Starting new deliver loop for 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.465 UTC [common.deliver] Handle -> DEBU 684 Attempting to read seek info message from 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] Step -> INFO 685 1 is starting a new election at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 686 1 became pre-candidate at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] poll -> INFO 687 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 688 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 689 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.488 UTC [orderer.common.cluster] NewStream -> DEBU 68a Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10"
orderer0.example.com | "2019-05-02 09:27:15.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68b Sending msg of 28 bytes to 2 on channel businesschannel took 357.3µs"
orderer0.example.com | "2019-05-02 09:27:15.489 UTC [orderer.common.cluster] NewStream -> DEBU 68c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10"
orderer0.example.com | "2019-05-02 09:27:15.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68d Sending msg of 28 bytes to 3 on channel businesschannel took 821.6µs"
orderer0.example.com | "2019-05-02 09:27:15.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 964.2µs "
orderer0.example.com | "2019-05-02 09:27:15.500 UTC [orderer.common.cluster] Step -> DEBU 690 Connection from orderer1.example.com(172.18.0.4:44256)"
orderer0.example.com | "2019-05-02 09:27:15.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] poll -> INFO 692 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 693 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 694 1 became candidate at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] poll -> INFO 695 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.503 UTC [orderer.consensus.etcdraft] campaign -> INFO 697 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.197ms "
orderer0.example.com | "2019-05-02 09:27:15.504 UTC [orderer.common.cluster] Step -> DEBU 698 Connection from orderer2.example.com(172.18.0.3:56182)"
orderer0.example.com | "2019-05-02 09:27:15.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 699 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69a Sending msg of 28 bytes to 3 on channel businesschannel took 96.6µs"
orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69b Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs"
orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.1µs "
orderer0.example.com | "2019-05-02 09:27:15.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.3µs "
orderer0.example.com | "2019-05-02 09:27:15.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] poll -> INFO 69f 1 received MsgVoteResp from 3 at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6a0 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6a1 1 became leader at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] run -> INFO 6a2 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] run -> INFO 6a4 Leader 1 is present, quit campaign" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a5 Sending msg of 36 bytes to 3 on channel businesschannel took 18.9µs"
orderer0.example.com | "2019-05-02 09:27:15.515 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a6 Sending msg of 36 bytes to 2 on channel businesschannel took 16.2µs"
orderer0.example.com | "2019-05-02 09:27:15.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a7 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 416.5µs "
orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a8 Raft leader changed: 0 -> 1" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a9 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6aa Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs "
orderer0.example.com | "2019-05-02 09:27:15.522 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.522 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ac Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs"
orderer0.example.com | "2019-05-02 09:27:15.523 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.9µs "
orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ae Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs"
orderer0.example.com | "2019-05-02 09:27:15.525 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.3µs "
orderer0.example.com | "2019-05-02 09:27:15.526 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.662 UTC [policies] Evaluate -> DEBU 6b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.663 UTC [policies] Evaluate -> DEBU 6b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.665 UTC [msp] DeserializeIdentity -> DEBU 6b9 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:15.665 UTC [msp.identity] newIdentity -> DEBU 6ba Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:15.666 UTC [cauthdsl] func1 -> DEBU 6bb 0xc0008a3f80 gate 1556789235666884700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bc 0xc0008a3f80 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bd 0xc0008a3f80 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6be 0xc0008a3f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bf 0xc0008a3f80 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [cauthdsl] func1 -> DEBU 6c0 0xc0008a3f80 gate 1556789235666884700 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c1 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] func1 -> DEBU 6c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c4 Signature set did not satisfy policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func1 -> DEBU 6c9 0xc0009315b0 gate 1556789235670009000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6ca 0xc0009315b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6cb 0xc0009315b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cc 0xc0009315b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cd 0xc0009315b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func1 -> DEBU 6ce 0xc0009315b0 gate 1556789235670009000 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6cf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:15.672 UTC [cauthdsl] func1 -> DEBU 6d2 0xc000931e10 gate 1556789235672729900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.484 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group:<groups:<key:"Application" value:<version:1 groups:<key:"Org1MSP" value:<version:1 values:<key:"AnchorPeers" value:<value:"\n\033\n\026peer0.org1.example.com\020\2137" mod_policy:"Admins" > > values:<key:"MSP" value:<value:"\022\363!\n\007Org1MSP\022\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\nZ\332\r\010\001\022\352\006\n\337\006-----BEGIN CERTIFICATE-----\nMIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y\naZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\na7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw\nRAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\006client\032\350\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Org2MSP" value:<values:<key:"MSP" value:<value:"\022\377!\n\007Org2MSP\022\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\nZ\342\r\010\001\022\356\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\006client\032\354\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"ACLs" value:<value:"\n.\n\014peer/Propose\022\036\n\034/Channel/Application/Writers\n4\n\022cscc/GetConfigTree\022\036\n\034/Channel/Application/Readers\nF\n$_lifecycle/CommitChaincodeDefinition\022\036\n\034/Channel/Application/Writers\nF\n$_lifecycle/QueryNamespaceDefinitions\022\036\n\034/Channel/Application/Readers\n5\n\023event/FilteredBlock\022\036\n\034/Channel/Application/Readers\n7\n\025lscc/GetChaincodeData\022\036\n\034/Channel/Application/Readers\n?\n\035cscc/SimulateConfigTreeUpdate\022\036\n\034/Channel/Application/Readers\n6\n\024lscc/ChaincodeExists\022\036\n\034/Channel/Application/Readers\n5\n\023cscc/GetConfigBlock\022\036\n\034/Channel/Application/Readers\n9\n\027qscc/GetTransactionByID\022\036\n\034/Channel/Application/Readers\n7\n\025qscc/GetBlockByNumber\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByHash\022\036\n\034/Channel/Application/Readers\nE\n#_lifecycle/QueryChaincodeDefinition\022\036\n\034/Channel/Application/Readers\n3\n\021qscc/GetChainInfo\022\036\n\034/Channel/Application/Readers\n;\n\031peer/ChaincodeToChaincode\022\036\n\034/Channel/Application/Readers\n@\n\036lscc/GetInstantiatedChaincodes\022\036\n\034/Channel/Application/Readers\n8\n\026lscc/GetDeploymentSpec\022\036\n\034/Channel/Application/Readers\n-\n\013event/Block\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByTxID\022\036\n\034/Channel/Application/Readers" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"LifecycleEndorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Orderer" value:<groups:<key:"OrdererOrg" value:<values:<key:"MSP" value:<value:"\022\267\023\n\nOrdererMSP\022\302\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n\"\201\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\317\006-----BEGIN CERTIFICATE-----\nMIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt\nN6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2\n+JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi\nUHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf\nmFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BatchSize" value:<value:"\010\364\003\020\200\200\200\005\030\200\200\200\001" mod_policy:"Admins" > > values:<key:"BatchTimeout" value:<value:"\n\0022s" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"ChannelRestrictions" value:<mod_policy:"Admins" > > values:<key:"ConsensusType" value:<value:"\n\010etcdraft\022\224*\n\375\r\n\024orderer0.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer1.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI\nwzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer2.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2\nfsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\022\022\n\005500ms\020\n\030\001 \005(\200\200\200\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"BlockValidation" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BlockDataHashingStructure" value:<value:"\010\377\377\377\377\017" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"Consortium" value:<value:"\n\020SampleConsortium" mod_policy:"Admins" > > values:<key:"HashingAlgorithm" value:<value:"\n\006SHA256" mod_policy:"Admins" > > values:<key:"OrdererAddresses" value:<value:"\n\031orderer0.example.com:7050\n\031orderer1.example.com:7050\n\031orderer2.example.com:7050" mod_policy:"/Channel/Orderer/Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > "
peer0.org1.example.com | "2019-05-02 09:27:22.485 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:22.486 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []"
peer0.org1.example.com | "2019-05-02 09:27:22.498 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59c Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.499 UTC [valinternal] ApplyWriteSet -> DEBU 59d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0030e3940)}"
peer0.org1.example.com | "2019-05-02 09:27:22.498 UTC [msp.identity] Sign -> DEBU 59b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.499 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a0 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a1 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:22.501 UTC [kvledger] CommitWithPvtData -> DEBU 5a2 [businesschannel] Committing block [1] to storage"
peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [msp.identity] Sign -> DEBU 59f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.501 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a3 Writing block [1] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:22.502 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a4 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53220"
peer0.org1.example.com | "2019-05-02 09:27:22.505 UTC [pvtdatastorage] Prepare -> DEBU 5a5 Saved 0 private data write sets for block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.508 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a6 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53220"
peer0.org1.example.com | "2019-05-02 09:27:22.509 UTC [msp.identity] Verify -> DEBU 5a7 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:22.510 UTC [fsblkstorage] indexBlock -> DEBU 5a8 Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets=
peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22679
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5aa txid [] is a duplicate of a previous tx. Not indexing in txid-index"
peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5ab Adding txLoc [fileSuffixNum=0, offset=24010, bytesLength=22679] for tx number:[0] ID: [] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:22.515 UTC [msp.identity] Verify -> DEBU 5ac Verify: sig = 00000000 30 44 02 20 6a 2f b1 fd 86 2d 6e f1 4f d9 e2 09 |0D. j/...-n.O...|
peer0.org1.example.com | 00000010 ac 77 7b be 04 18 8d bd 5d b7 26 b7 e4 80 63 7a |.w{.....].&...cz|
peer0.org1.example.com | 00000020 10 83 3d 19 02 20 4d 28 09 f2 b5 79 24 95 e1 e8 |..=.. M(...y$...|
peer0.org1.example.com | 00000030 7b 20 a8 e1 bc 49 f4 98 96 7c 1a e7 a7 9e 69 09 |{ ...I...|....i.|
peer0.org1.example.com | 00000040 d6 37 43 cd 2b 6e |.7C.+n|"
peer0.org1.example.com | "2019-05-02 09:27:22.518 UTC [fsblkstorage] updateCheckpoint -> DEBU 5ad Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47626], isChainEmpty=[false], lastBlockNumber=[1]"
peer0.org1.example.com | "2019-05-02 09:27:22.518 UTC [pvtdatastorage] Commit -> DEBU 5ae Committing private data for block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.519 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5af Authenticated 172.18.0.6:53220"
peer0.org1.example.com | "2019-05-02 09:27:22.520 UTC [gossip.comm] GossipStream -> DEBU 5b0 Servicing 172.18.0.6:53220"
peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [gossip.comm] readFromStream -> DEBU 5b1 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [gossip.comm] func2 -> DEBU 5b2 Client 172.18.0.6:53220 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [comm.grpc.server] 1 -> INFO 5b3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.497Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0959ms
peer0.org1.example.com | "2019-05-02 09:27:22.522 UTC [gossip.comm] writeToStream -> DEBU 5b4 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [grpc] infof -> DEBU 5a9 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [pvtdatastorage] Commit -> DEBU 5b5 Committed private data for block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [kvledger] CommitWithPvtData -> DEBU 5b6 [businesschannel] Committing block [1] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b7 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b9 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5ba Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [stateleveldb] ApplyUpdates -> DEBU 5bb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]"
peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] Commit -> DEBU 5bc Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bd Preparing potential purge list working-set for expiringAtBlk [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] func1 -> DEBU 5be launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [kvledger] CommitWithPvtData -> DEBU 5bf [businesschannel] Committing block [1] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c0 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c1 Skipping transaction [0] since it is not an endorsement transaction"
peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [leveldbhelper] GetIterator -> DEBU 5c2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:22.529 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5c3 No expiry entry found for expiringAtBlk [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [historyleveldb] Commit -> DEBU 5c4 Channel [businesschannel]: Updates committed to history database for blockNo [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [kvledger] CommitWithPvtData -> INFO 5c5 [businesschannel] Committed block [1] with 1 transaction(s) in 62ms (state_validation=30ms block_commit=22ms state_commit=4ms)"
peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c6 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020802 "
peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c7 Sign: digest: AAE95B93C2C6B23F762A87C4C48D3503B8487313D8F657F7F2C6091DFBA174C6 "
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.state] commitBlock -> DEBU 5c8 [businesschannel] Committed block [1] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.state] deliverPayloads -> DEBU 5c9 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> INFO 5ca [businesschannel] Received block [2] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> DEBU 5cb [businesschannel] Validating block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cc [businesschannel] START Block Validation for block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cd expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] validateTx -> DEBU 5ce [businesschannel] validateTx starts for block 0xc0030e3d40 env 0xc0032a2e10 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5cf ValidateTransactionEnvelope starts for envelope 0xc0032a2e10"
peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5d0 Header is channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" "
peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] validateChannelHeader -> DEBU 5d1 validateChannelHeader info: header type 1"
peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d2 begin"
peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [msp] GetManagerForChain -> DEBU 5d3 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:22.536 UTC [msp] DeserializeIdentity -> DEBU 5d4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.536 UTC [msp.identity] newIdentity -> DEBU 5d5 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
peer0.org1.example.com | QQ==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}"
peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp] Validate -> DEBU 5d7 MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d8 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5d9 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...|
peer0.org1.example.com | 00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|"
peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5da Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..|
peer0.org1.example.com | 00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N|
peer0.org1.example.com | 00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..|
peer0.org1.example.com | 00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.|
peer0.org1.example.com | 00000040 69 13 32 1f 05 3e |i.2..>|"
peer0.org1.example.com | "2019-05-02 09:27:22.538 UTC [protoutils] checkSignatureFromCreator -> DEBU 5db exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:22.538 UTC [protoutils] validateConfigTransaction -> DEBU 5dc validateConfigTransaction starts for data 0xc003324000, header channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" "
peer0.org1.example.com | "2019-05-02 09:27:22.539 UTC [committer.txvalidator] validateTx -> DEBU 5dd Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [comm.grpc.server] 1 -> INFO 5de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.539Z grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.1µs
peer0.org1.example.com | "2019-05-02 09:27:22.539 UTC [common.configtx] addToMap -> DEBU 5df Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e0 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e1 Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.542 UTC [msp.identity] Sign -> DEBU 5ea Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.543 UTC [msp.identity] Sign -> DEBU 5eb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.543 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ec Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53224"
orderer0.example.com | "2019-05-02 09:27:15.672 UTC [cauthdsl] func2 -> DEBU 6d3 0xc000931e10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:15.673 UTC [cauthdsl] func2 -> DEBU 6d4 0xc000931e10 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:15.673 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d5 Checking if identity satisfies MEMBER role for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:15.673 UTC [msp] Validate -> DEBU 6d6 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:15.674 UTC [msp] getCertificationChain -> DEBU 6d7 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:15.674 UTC [cauthdsl] func2 -> DEBU 6d8 0xc000931e10 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:15.674 UTC [msp.identity] Verify -> DEBU 6d9 Verify: digest = 00000000 5d de 64 d6 6d 2f 41 35 99 2f 7a e1 d4 24 25 52 |].d.m/A5./z..$%R|
orderer0.example.com | 00000010 d3 0d 9f f2 6c be 2b 2e 5e d9 bc 21 66 c6 c6 e5 |....l.+.^..!f...|"
orderer0.example.com | "2019-05-02 09:27:15.675 UTC [msp.identity] Verify -> DEBU 6da Verify: sig = 00000000 30 44 02 20 69 2e 43 52 f9 a2 4c ed 63 1d e2 b8 |0D. i.CR..L.c...|
orderer0.example.com | 00000010 09 85 66 2f fc ae 45 72 b1 71 08 6a 24 65 ed 70 |..f/..Er.q.j$e.p|
orderer0.example.com | 00000020 22 82 96 57 02 20 2c 5c 91 98 de 14 55 f8 b3 f7 |"..W. ,\....U...|
orderer0.example.com | 00000030 eb 53 a5 2b ed 05 06 f5 eb 15 04 bc 36 73 ab eb |.S.+........6s..|
orderer0.example.com | 00000040 0b ca 35 3e 0e be |..5>..|"
orderer0.example.com | "2019-05-02 09:27:15.675 UTC [cauthdsl] func2 -> DEBU 6db 0xc000931e10 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:15.675 UTC [cauthdsl] func1 -> DEBU 6dc 0xc000931e10 gate 1556789235672729900 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:15.675 UTC [policies] Evaluate -> DEBU 6dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6df Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e1 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:15.677 UTC [common.deliver] deliverBlocks -> DEBU 6e3 [channel: businesschannel] Received seekInfo (0xc000b6c180) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] Next -> DEBU 6e4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0"
orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] newBlockfileStream -> DEBU 6e5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e6 Remaining bytes=[23938], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e7 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e8 blockbytes [23935] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:15.678 UTC [common.deliver] deliverBlocks -> DEBU 6e9 [channel: businesschannel] Delivering block [0] for (0xc000b6c180) for 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] deliverBlocks -> DEBU 6ea [channel: businesschannel] Done delivering to 172.18.0.8:57152 for (0xc000b6c180)"
orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6eb Waiting for new SeekInfo from 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6ec Attempting to read seek info message from 172.18.0.8:57152"
orderer0.example.com | "2019-05-02 09:27:15.682 UTC [common.deliver] Handle -> DEBU 6ed Received EOF from 172.18.0.8:57152, hangup"
orderer0.example.com | "2019-05-02 09:27:15.682 UTC [orderer.common.server] func1 -> DEBU 6ee Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:15.682 UTC [comm.grpc.server] 1 -> INFO 6ef streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57152 grpc.code=OK grpc.call_duration=219.6995ms
orderer0.example.com | "2019-05-02 09:27:15.685 UTC [grpc] warningf -> DEBU 6f0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57152: read: connection reset by peer"
orderer0.example.com | "2019-05-02 09:27:15.685 UTC [grpc] infof -> DEBU 6f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.688 UTC [grpc] infof -> DEBU 6f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.689 UTC [grpc] infof -> DEBU 6f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f5 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f7 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:15.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs"
orderer0.example.com | "2019-05-02 09:27:15.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs "
orderer0.example.com | "2019-05-02 09:27:15.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs"
orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fd Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs"
orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.1µs "
orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs "
orderer0.example.com | "2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 702 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 703 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs"
orderer0.example.com | "2019-05-02 09:27:16.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 704 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs "
orderer0.example.com | "2019-05-02 09:27:16.325 UTC [orderer.common.server] replicateDisabledChains -> DEBU 705 No inactive chains to try to replicate"
orderer0.example.com | "2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 706 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs"
orderer0.example.com | "2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 707 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs"
orderer0.example.com | "2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.4µs "
orderer0.example.com | "2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 709 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.3µs "
orderer0.example.com | "2019-05-02 09:27:16.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70d Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs"
orderer0.example.com | "2019-05-02 09:27:16.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.8µs "
orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70f Sending msg of 28 bytes to 2 on channel businesschannel took 65.5µs"
orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 710 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs"
orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 711 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 235.6µs "
orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 712 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 625.1µs "
orderer0.example.com | "2019-05-02 09:27:16.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 713 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:16.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 714 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 715 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 716 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs"
orderer0.example.com | "2019-05-02 09:27:17.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs "
orderer0.example.com | "2019-05-02 09:27:17.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 718 Sending msg of 28 bytes to 2 on channel businesschannel took 68.5µs"
orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 719 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs"
orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.3µs "
orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 860.4µs "
orderer0.example.com | "2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.714 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71f Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs"
orderer0.example.com | "2019-05-02 09:27:17.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.7µs "
orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 721 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs"
orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 722 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs"
orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 723 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs "
orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 724 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs "
orderer0.example.com | "2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 725 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 726 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:22.544 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53224"
peer0.org1.example.com | "2019-05-02 09:27:22.544 UTC [msp.identity] Verify -> DEBU 5ee Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [msp.identity] Verify -> DEBU 5ef Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..|
peer0.org1.example.com | 00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.|
peer0.org1.example.com | 00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9|
peer0.org1.example.com | 00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F|
peer0.org1.example.com | 00000040 0a ba a5 ee ef 51 1b |.....Q.|"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5f0 Authenticated 172.18.0.6:53224"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.comm] GossipStream -> DEBU 5f1 Servicing 172.18.0.6:53224"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f4 Got message: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [msp.identity] Verify -> DEBU 5f9 Verify: digest = 00000000 37 72 e6 74 46 b4 11 7d 5e a5 ea 1b 6d 00 8a c8 |7r.tF..}^...m...|
peer0.org1.example.com | 00000010 83 ff 07 59 44 a2 84 8c 23 81 7c 6e 6f a0 c5 82 |...YD...#.|no...|"
peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fb Verify: sig = 00000000 30 45 02 21 00 a2 4e 55 7b b6 c4 b6 75 ed b1 4f |0E.!..NU{...u..O|
peer0.org1.example.com | 00000010 8c c7 7a 40 4b d5 5b bd 36 c1 64 78 b0 73 07 91 |..z@K.[.6.dx.s..|
peer0.org1.example.com | 00000020 e5 ba d6 e3 c5 02 20 4a 8b e3 63 85 4d c7 68 4c |...... J..c.M.hL|
peer0.org1.example.com | 00000030 c1 08 75 c9 ec fb 0a 07 f7 57 f9 62 5f 42 1f 63 |..u......W.b_B.c|
peer0.org1.example.com | 00000040 45 46 49 2c b2 92 d4 |EFI,...|"
peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fc Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fd Verify: sig = 00000000 30 44 02 20 3d 9c 91 b3 48 ee 0a 55 9c 03 f2 f3 |0D. =...H..U....|
peer0.org1.example.com | 00000010 60 93 76 94 d5 c5 bc c6 0a 5c ca ce 16 66 eb d8 |`.v......\...f..|
peer0.org1.example.com | 00000020 8a 17 73 73 02 20 6b b6 ff e4 d3 99 80 3f a7 c9 |..ss. k......?..|
peer0.org1.example.com | 00000030 cf a6 b2 0c de 4d 7a f7 ae 8d 3b 7a c1 85 ad 3f |.....Mz...;z...?|
peer0.org1.example.com | 00000040 da 33 90 96 41 41 |.3..AA|"
peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 600 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 601 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 602 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 603 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 604 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 605 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 606 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] Send -> DEBU 607 Entering, sending GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 608 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 609 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 60a Exiting"
orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 727 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 728 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs"
orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs "
orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72a Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs"
orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72b Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs"
orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs "
orderer0.example.com | "2019-05-02 09:27:18.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 699.2µs "
orderer0.example.com | "2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:18.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 730 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:18.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 731 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs"
orderer0.example.com | "2019-05-02 09:27:18.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.4µs "
orderer0.example.com | "2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 733 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs"
orderer0.example.com | "2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 734 Sending msg of 28 bytes to 3 on channel businesschannel took 27.5µs"
orderer0.example.com | "2019-05-02 09:27:18.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU 735 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9941ms "
orderer0.example.com | "2019-05-02 09:27:18.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 736 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4172ms "
orderer0.example.com | "2019-05-02 09:27:18.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 737 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:18.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 738 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 739 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs"
orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs "
orderer0.example.com | "2019-05-02 09:27:19.476 UTC [orderer.common.server] Deliver -> DEBU 73c Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:19.480 UTC [common.deliver] Handle -> DEBU 73d Starting new deliver loop for 172.18.0.8:57178"
orderer0.example.com | "2019-05-02 09:27:19.481 UTC [common.deliver] Handle -> DEBU 73e Attempting to read seek info message from 172.18.0.8:57178"
orderer0.example.com | "2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs"
orderer0.example.com | "2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 740 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs"
orderer0.example.com | "2019-05-02 09:27:19.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 741 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 439.3µs "
orderer0.example.com | "2019-05-02 09:27:19.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.3µs "
orderer0.example.com | "2019-05-02 09:27:19.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 743 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 744 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.503 UTC [orderer.common.server] Broadcast -> DEBU 745 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:19.503 UTC [orderer.common.broadcast] Handle -> DEBU 746 Starting new broadcast loop for 172.18.0.8:57180"
orderer0.example.com | "2019-05-02 09:27:19.504 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 747 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57180"
orderer0.example.com | "2019-05-02 09:27:19.504 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 748 Processing config update message for channel businesschannel"
orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 749 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.506 UTC [cauthdsl] func1 -> DEBU 74e 0xc000889c20 gate 1556789239506818300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 74f 0xc000889c20 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 750 0xc000889c20 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 751 0xc000889c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:27:19.508 UTC [cauthdsl] func2 -> DEBU 752 0xc000889c20 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:19.508 UTC [cauthdsl] func1 -> DEBU 753 0xc000889c20 gate 1556789239506818300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:19.508 UTC [policies] Evaluate -> DEBU 754 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.509 UTC [policies] Evaluate -> DEBU 755 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.509 UTC [policies] func1 -> DEBU 756 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]"
orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 757 Signature set did not satisfy policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 758 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 759 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.511 UTC [cauthdsl] func1 -> DEBU 75c 0xc000c1e9a0 gate 1556789239511792800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75d 0xc000c1e9a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75e 0xc000c1e9a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75f 0xc000c1e9a0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 760 Verify: digest = 00000000 2d 24 ae af 2b ab cf a4 1b 31 20 53 db 1d e7 59 |-$..+....1 S...Y|
orderer0.example.com | 00000010 93 1c 74 0e af 14 c2 23 6a 79 e1 94 8c 28 23 44 |..t....#jy...(#D|"
orderer0.example.com | "2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 761 Verify: sig = 00000000 30 45 02 21 00 f1 15 94 c7 e6 9e a3 48 5c b6 ac |0E.!........H\..|
orderer0.example.com | 00000010 c5 6f d4 68 62 76 0f 4e 5f a2 30 ea 64 12 1b e3 |.o.hbv.N_.0.d...|
orderer0.example.com | 00000020 5a 20 ab fe 8d 02 20 46 77 44 3d 2f 1a cc c6 ff |Z .... FwD=/....|
orderer0.example.com | 00000030 b6 8f 70 4d 2a 8b a2 6a 0d 7e 4c b7 28 f9 1f d5 |..pM*..j.~L.(...|
orderer0.example.com | 00000040 b1 62 49 3c d7 2f 05 |.bI<./.|"
orderer0.example.com | "2019-05-02 09:27:19.514 UTC [cauthdsl] func2 -> DEBU 762 0xc000c1e9a0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:19.514 UTC [cauthdsl] func1 -> DEBU 763 0xc000c1e9a0 gate 1556789239511792800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 764 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 766 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 767 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 768 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76a Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76b Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76c Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 770 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 771 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 772 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 773 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 774 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 775 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 776 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 777 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 778 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 779 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 77a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77b Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77c Processing change to key: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] policyForItem -> DEBU 77d Getting policy for item Org1MSP with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77e Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77f Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 780 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 781 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 782 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 783 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 784 Manager Channel/Application looking up path [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 785 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 786 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 787 Manager Channel/Application/Org1MSP looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Evaluate -> DEBU 788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [cauthdsl] func1 -> DEBU 789 0xc000b87b00 gate 1556789239520652300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:19.520 UTC [cauthdsl] func2 -> DEBU 78a 0xc000b87b00 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78b 0xc000b87b00 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 78c Checking if identity satisfies ADMIN role for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78d 0xc000b87b00 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78e Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..|
orderer0.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|"
orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78f Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.|
orderer0.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$|
orderer0.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.|
orderer0.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..|
orderer0.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|"
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [cauthdsl] func2 -> DEBU 790 0xc000b87b00 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [cauthdsl] func1 -> DEBU 791 0xc000b87b00 gate 1556789239520652300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 792 Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 793 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 794 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 795 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 796 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 797 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 798 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 799 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79a Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79b Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79c Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79d Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79e Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79f Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a0 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a1 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a2 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a3 Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a4 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7ab Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ac Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ad Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ae Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7af Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b0 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7b1 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b2 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b3 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b4 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] verifyDeltaSet -> DEBU 60d Processing change to key: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] policyForItem -> DEBU 60e Getting policy for item Org2MSP with mod_policy Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [policies] Manager -> DEBU 60f Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 610 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 612 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 613 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 615 Manager Channel/Application looking up path [Org2MSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 616 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 617 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 618 Manager Channel/Application/Org2MSP looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Evaluate -> DEBU 619 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [msp] DeserializeIdentity -> DEBU 61a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [msp.identity] newIdentity -> DEBU 61b Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func1 -> DEBU 61c 0xc003390d80 gate 1556789242554648600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61d 0xc003390d80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61e 0xc003390d80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 61f Checking if identity satisfies ADMIN role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [cauthdsl] func2 -> DEBU 620 0xc003390d80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 621 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....|
peer0.org1.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|"
peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 622 Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l|
peer0.org1.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...|
peer0.org1.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...|
peer0.org1.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....|
peer0.org1.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|"
peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [cauthdsl] func2 -> DEBU 623 0xc003390d80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [cauthdsl] func1 -> DEBU 624 0xc003390d80 gate 1556789242554648600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 625 Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [common.configtx] verifyDeltaSet -> DEBU 627 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key Admins to "
peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Endorsement to "
peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to "
peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to "
peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 631 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 632 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 633 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 634 Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b5 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b6 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b7 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] Validate -> DEBU 7b8 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:19.529 UTC [common.channelconfig] validateMSP -> DEBU 7b9 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] newBccspMsp -> DEBU 7ba Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] New -> DEBU 7bb Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] Setup -> DEBU 7bc Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.530 UTC [msp.identity] newIdentity -> DEBU 7bd Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.531 UTC [msp.identity] newIdentity -> DEBU 7be Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7bf Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] Validate -> DEBU 7c0 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c1 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] hasOURole -> DEBU 7c2 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c3 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c4 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c5 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c6 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c7 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] Validate -> DEBU 7c8 Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] validateMSP -> DEBU 7c9 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [msp] newBccspMsp -> DEBU 7ca Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.533 UTC [msp] New -> DEBU 7cb Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.534 UTC [msp] Setup -> DEBU 7cc Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.534 UTC [msp.identity] newIdentity -> DEBU 7cd Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.535 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7cf Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] Validate -> DEBU 7d0 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d1 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] hasOURole -> DEBU 7d2 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d3 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] NewStandardValues -> DEBU 7d4 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d5 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 635 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 636 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 637 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 638 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 639 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63a Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63b Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63c Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63d Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63e Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.channelconfig] NewStandardValues -> DEBU 63f Initializing protos for *channelconfig.ChannelProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.channelconfig] initializeProtosStruct -> DEBU 640 Processing field: HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 641 Processing field: BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 642 Processing field: OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 643 Processing field: Consortium"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 644 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] NewStandardValues -> DEBU 645 Initializing protos for *channelconfig.ApplicationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 646 Processing field: ACLs"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 647 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 648 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 649 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] Validate -> DEBU 64c Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] validateMSP -> DEBU 64d Setting up MSP for org Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [msp] newBccspMsp -> DEBU 64e Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp] New -> DEBU 64f Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp] Setup -> DEBU 650 Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp.identity] newIdentity -> DEBU 651 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.565 UTC [msp.identity] newIdentity -> DEBU 652 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 653 Checking if identity satisfies role [CLIENT] for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] Validate -> DEBU 654 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] getCertificationChain -> DEBU 655 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] hasOURole -> DEBU 656 MSP Org1MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [msp] getCertificationChain -> DEBU 657 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 658 Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 659 Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [common.channelconfig] Validate -> DEBU 65c Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [common.channelconfig] validateMSP -> DEBU 65d Setting up MSP for org Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] newBccspMsp -> DEBU 65e Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] New -> DEBU 65f Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] Setup -> DEBU 660 Setting up MSP instance Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp.identity] newIdentity -> DEBU 661 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.569 UTC [msp.identity] newIdentity -> DEBU 662 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 663 Checking if identity satisfies role [CLIENT] for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] Validate -> DEBU 664 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 665 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] hasOURole -> DEBU 666 MSP Org2MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 667 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 668 Initializing protos for *channelconfig.OrdererProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 669 Processing field: ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66a Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66b Processing field: BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66c Processing field: KafkaBrokers"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66d Processing field: ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66e Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 66f Initializing protos for *channelconfig.OrdererOrgProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 670 Processing field: Endpoints"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] NewStandardValues -> DEBU 671 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 672 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] validateMSP -> DEBU 673 Setting up MSP for org OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] newBccspMsp -> DEBU 674 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] New -> DEBU 675 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d7 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d9 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7da Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7db Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dc Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7dd Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7de Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] validateMSP -> DEBU 7df Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [msp] newBccspMsp -> DEBU 7e0 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.538 UTC [msp] New -> DEBU 7e1 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.539 UTC [msp] Setup -> DEBU 7e2 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:19.539 UTC [msp.identity] newIdentity -> DEBU 7e3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.540 UTC [msp.identity] newIdentity -> DEBU 7e4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Validate -> DEBU 7e5 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e6 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e7 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e8 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e9 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ea Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7eb Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ec Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ed Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ee Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ef Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f0 Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f1 Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f2 Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f3 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f4 Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f5 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f8 Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] Setup -> DEBU 676 Setting up MSP instance OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:22.573 UTC [msp.identity] newIdentity -> DEBU 677 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.574 UTC [msp.identity] newIdentity -> DEBU 678 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.574 UTC [msp] Validate -> DEBU 679 MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67a Setting up the MSP manager (3 msps)"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67b MSP manager setup complete, setup 3 msps"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Readers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy Readers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Writers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 808 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 809 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80e Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80f Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82c As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82d As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82e Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82f Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 830 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 831 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 832 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 833 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 834 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 835 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 836 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 837 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 838 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 839 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83a Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83b Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.channelconfig] LogSanityChecks -> DEBU 83c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83d Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83e Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy BlockValidation for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Admins for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Endorsement for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 685 Proposed new policy Readers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 686 Proposed new policy Writers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 687 Proposed new policy Writers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 688 Proposed new policy Admins for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 689 Proposed new policy Endorsement for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68a Proposed new policy Readers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68b Proposed new policy Admins for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68c Proposed new policy LifecycleEndorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68d Proposed new policy Endorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68e Proposed new policy Readers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68f Proposed new policy Writers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 690 Proposed new policy Readers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 691 Proposed new policy Writers for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 692 Proposed new policy Admins for Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Group] /Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Value] /Channel/Orderer/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b3 Adding to config map: [Value] /Channel/Orderer/BatchSize"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b5 Adding to config map: [Policy] /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b6 Adding to config map: [Policy] /Channel/Orderer/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b7 Adding to config map: [Policy] /Channel/Orderer/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6b9 Adding to config map: [Value] /Channel/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6ba Adding to config map: [Value] /Channel/HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bb Adding to config map: [Value] /Channel/Consortium"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bc Adding to config map: [Value] /Channel/BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bd Adding to config map: [Value] /Channel/OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6be Adding to config map: [Policy] /Channel/Admins"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6bf Adding to config map: [Policy] /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6c0 Adding to config map: [Policy] /Channel/Writers"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c1 As expected, current configuration has policy '/Channel/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c2 As expected, current configuration has policy '/Channel/Writers'"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c3 Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c4 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c5 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c6 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c7 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c8 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c9 As expected, current configuration has policy '/Channel/Application/Readers'"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ca As expected, current configuration has policy '/Channel/Application/Writers'"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6cb As expected, current configuration has policy '/Channel/Application/Admins'"
peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6cc Manager Channel looking up path [Orderer]"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cd Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6ce Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cf Manager Channel/Orderer looking up path []"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6d0 Manager Channel/Orderer has managers OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [common.channelconfig] LogSanityChecks -> DEBU 6d1 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [common.capabilities] Supported -> DEBU 6d2 Application capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [common.capabilities] Supported -> DEBU 6d3 Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d4 Processing new config for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d5 Calling out because config was updated for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d6 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d7 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d8 Creating state provider for chainID businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6da Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [msp] DeserializeIdentity -> DEBU 6de Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [msp.identity] newIdentity -> DEBU 6df Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [cauthdsl] func1 -> DEBU 6e0 0xc00347a750 gate 1556789242591792300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e1 0xc00347a750 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e2 0xc00347a750 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e3 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.593 UTC [msp] Validate -> DEBU 6e4 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.593 UTC [msp] getCertificationChain -> DEBU 6e5 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e6 0xc00347a750 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [msp.identity] Verify -> DEBU 6e7 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h|
peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y<vd...|"
peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [msp.identity] Verify -> DEBU 6e8 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....|
peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b|
peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..|
peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.|
peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|"
peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e9 0xc00347a750 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func1 -> DEBU 6ea 0xc00347a750 gate 1556789242591792300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 83f Sign: plaintext: 0AD2060A1B08011A0608F7EFAAE60522...6A0D7E4CB728F91FD5B162493CD72F05 "
orderer0.example.com | "2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 840 Sign: digest: 5EB9017E36426B312471394DE5B16CCACE277C4E33EFA0BE53BE4C1EF1CB951D "
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 841 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 842 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
orderer0.example.com | "2019-05-02 09:27:19.555 UTC [msp] DeserializeIdentity -> DEBU 846 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:19.556 UTC [msp.identity] newIdentity -> DEBU 847 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func1 -> DEBU 848 0xc000847e50 gate 1556789239556730800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 849 0xc000847e50 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 84a 0xc000847e50 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:19.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 84b Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp] Validate -> DEBU 84c MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.557 UTC [cauthdsl] func2 -> DEBU 84d 0xc000847e50 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84e Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.|
orderer0.example.com | 00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|"
orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84f Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....|
orderer0.example.com | 00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L|
orderer0.example.com | 00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....|
orderer0.example.com | 00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.|
orderer0.example.com | 00000040 1a 33 13 1f 94 5f 84 |.3..._.|"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [cauthdsl] func2 -> DEBU 850 0xc000847e50 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [cauthdsl] func1 -> DEBU 851 0xc000847e50 gate 1556789239556730800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 852 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 854 Signature set satisfies policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 855 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 856 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 857 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] propose -> INFO 858 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 859 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 85a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57180"
orderer0.example.com | "2019-05-02 09:27:19.563 UTC [orderer.consensus.etcdraft] 2 -> DEBU 85b Proposed block [1] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85c Sending msg of 22808 bytes to 2 on channel businesschannel took 22.3µs"
orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85d Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer1.example.com(orderer1.example.com:7050) took 108.3µs "
orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85e Sending msg of 22808 bytes to 3 on channel businesschannel took 696.7µs"
orderer0.example.com | "2019-05-02 09:27:19.565 UTC [orderer.common.broadcast] Handle -> WARN 85f Error reading from 172.18.0.8:57180: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:19.565 UTC [orderer.common.server] func1 -> DEBU 861 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:19.572 UTC [orderer.common.cluster.step] handleMessage -> DEBU 865 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 866 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 867 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 868 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs "
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 869 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6eb Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ed Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [gossip.gossip] JoinChan -> INFO 6ef Joining gossip network of channel businesschannel with 2 organizations"
peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f1 Anchor peer with same endpoint, skipping connecting to myself"
peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f2 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f3 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata: "
peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.597 UTC [gossip.service] updateEndpoints -> DEBU 6f5 Updating endpoints for chainID%!(EXTRA string=businesschannel)"
peer0.org1.example.com | "2019-05-02 09:27:22.597 UTC [peer] updateTrustedRoots -> DEBU 6f6 Updating trusted root authorities for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f7 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f8 scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] UpdateState -> DEBU 6f9 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] switchBalancer -> DEBU 6fa ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] HandleSubConnStateChange -> DEBU 6fb pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:27:22.604 UTC [grpc] HandleSubConnStateChange -> DEBU 6fc pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, READY"
peer0.org1.example.com | "2019-05-02 09:27:22.607 UTC [msp.identity] Sign -> DEBU 6fd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.608 UTC [msp.identity] Sign -> DEBU 6fe Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.609 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6ff Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU 700 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 701 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 702 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.618 UTC [msp.identity] newIdentity -> DEBU 703 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe
peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c
peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI
peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.620 UTC [msp] Validate -> DEBU 704 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.620 UTC [msp] getCertificationChain -> DEBU 705 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] verifyDeltaSet -> DEBU 87b Processing change to key: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] policyForItem -> DEBU 87c Getting policy for item Org1MSP with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87d Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87e Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87f Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 880 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 881 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 882 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 883 Manager Channel/Application looking up path [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 884 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 885 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 886 Manager Channel/Application/Org1MSP looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Evaluate -> DEBU 887 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func1 -> DEBU 888 0xc000931580 gate 1556789239574831400 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 889 0xc000931580 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88a 0xc000931580 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88b 0xc000931580 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88c Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..|
orderer0.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|"
orderer0.example.com | "2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88d Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.|
orderer0.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$|
orderer0.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.|
orderer0.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..|
orderer0.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|"
orderer0.example.com | "2019-05-02 09:27:19.568 UTC [comm.grpc.server] 1 -> INFO 88e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.0375ms
orderer0.example.com | "2019-05-02 09:27:19.566 UTC [common.deliver] Handle -> WARN 862 Error reading from 172.18.0.8:57178: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.server] func1 -> DEBU 88f Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:19.579 UTC [comm.grpc.server] 1 -> INFO 890 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2523ms
orderer0.example.com | "2019-05-02 09:27:19.566 UTC [grpc] infof -> DEBU 863 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:19.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 864 Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer2.example.com(orderer2.example.com:7050) took 235µs "
orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 891 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs "
orderer0.example.com | "2019-05-02 09:27:19.565 UTC [grpc] infof -> DEBU 860 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 892 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 893 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.592 UTC [cauthdsl] func2 -> DEBU 894 0xc000931580 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:19.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 895 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.594 UTC [cauthdsl] func1 -> DEBU 896 0xc000931580 gate 1556789239574831400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 897 Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 898 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.596 UTC [common.configtx] verifyDeltaSet -> DEBU 899 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:27:22.621 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 706 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.621 UTC [msp] DeserializeIdentity -> DEBU 707 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.623 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.623 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [peer] buildTrustedRootsForChain -> DEBU 70a updating root CAs for channel [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [policies] Evaluate -> DEBU 710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [cauthdsl] func1 -> DEBU 713 0xc00352b4e0 gate 1556789242625572000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer] buildTrustedRootsForChain -> DEBU 70f adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.600 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89f Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a3 Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a4 Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:27:19.606 UTC [common.configtx] recurseConfigMap -> DEBU 8a5 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a6 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a7 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a8 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a9 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8aa Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ab Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ac Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.610 UTC [common.configtx] recurseConfigMap -> DEBU 8ad Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8ae Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8af Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8b0 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] NewStandardValues -> DEBU 8b7 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b9 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.618 UTC [common.channelconfig] NewStandardValues -> DEBU 8ba Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:19.618 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bb Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] NewStandardValues -> DEBU 8bc Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] Validate -> DEBU 8be Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] validateMSP -> DEBU 8bf Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] newBccspMsp -> DEBU 8c0 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] New -> DEBU 8c1 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] Setup -> DEBU 8c2 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.621 UTC [msp.identity] newIdentity -> DEBU 8c3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.623 UTC [msp.identity] newIdentity -> DEBU 8c4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | "2019-05-02 09:27:22.626 UTC [cauthdsl] func2 -> DEBU 714 0xc00352b4e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 716 0xc00352b4e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 717 0xc00352b4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 718 0xc00352b4e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.626 UTC [peer] buildTrustedRootsForChain -> DEBU 715 adding app root CAs for MSP [Org2MSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [peer] buildTrustedRootsForChain -> DEBU 71a adding orderer root CAs for MSP [OrdererMSP]"
peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func1 -> DEBU 719 0xc00352b4e0 gate 1556789242625572000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [policies] Evaluate -> DEBU 71e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 71d config transaction received for chain businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [cauthdsl] func1 -> DEBU 71f 0xc00352be30 gate 1556789242629620200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> DEBU 721 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> INFO 722 [businesschannel] Validated block [2] in 95ms"
peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 720 [businesschannel] validateTx completes for block 0xc0030e3d40 env 0xc0032a2e10 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [cauthdsl] func2 -> DEBU 723 0xc00352be30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [cauthdsl] func2 -> DEBU 725 0xc00352be30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [gossip.privdata] listMissingPrivateData -> DEBU 724 Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [gossip.privdata] StoreBlock -> DEBU 726 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 727 Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [committer] preCommit -> DEBU 728 Received configuration update, calling CSCC ConfigUpdate"
peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [kvledger] CommitWithPvtData -> DEBU 729 [businesschannel] Validating state for block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [msp] Validate -> DEBU 72a MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [msp] getCertificationChain -> DEBU 72c MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [cauthdsl] func2 -> DEBU 72d 0xc00352be30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72e Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72f Verify: sig = 00000000 30 44 02 20 46 36 3c 9c 63 4e 98 06 45 41 b5 ff |0D. F6<.cN..EA..|
peer0.org1.example.com | 00000010 4e 14 48 c7 8a a7 13 94 df 63 a0 0f c9 54 77 20 |N.H......c...Tw |
peer0.org1.example.com | 00000020 aa 84 66 18 02 20 43 89 90 3d bb ea d8 eb b0 69 |..f.. C..=.....i|
peer0.org1.example.com | 00000030 a9 f6 22 a3 db 6e 0f a6 ea e0 07 fa 10 02 ba 42 |.."..n.........B|
peer0.org1.example.com | 00000040 4b 5d ee a7 42 7a |K]..Bz|"
peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 72b Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [cauthdsl] func2 -> DEBU 730 0xc00352be30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [cauthdsl] func1 -> DEBU 732 0xc00352be30 gate 1556789242629620200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 733 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 734 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 731 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 735 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 736 ValidateAndPrepareBatch() for block number = [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 738 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] preprocessProtoBlock -> DEBU 739 txType=CONFIG"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73a Performing custom processing for transaction [txid=], [txType=CONFIG]"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73b Processor for custom tx processing:&peer.configtxProcessor{}"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 73c constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 73d constructing new tx simulator txid = []"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [peer] GenerateSimulationResults -> DEBU 73e Processing CONFIG"
peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [policies] Evaluate -> DEBU 737 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [policies] Evaluate -> DEBU 73f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [gossip.comm] authenticateRemotePeer -> DEBU 740 Authenticated 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 742 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 743 Obtaining identity"
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.625 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8c5 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.626 UTC [msp] Validate -> DEBU 8c6 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.630 UTC [msp] getCertificationChain -> DEBU 8c7 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.631 UTC [msp] hasOURole -> DEBU 8c8 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:19.631 UTC [msp] getCertificationChain -> DEBU 8c9 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8ca Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cb Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8cc Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cd Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] Validate -> DEBU 8ce Anchor peers for org Org2MSP are "
orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] validateMSP -> DEBU 8cf Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.633 UTC [msp] newBccspMsp -> DEBU 8d0 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.633 UTC [msp] New -> DEBU 8d1 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.634 UTC [msp] Setup -> DEBU 8d2 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.636 UTC [msp.identity] newIdentity -> DEBU 8d3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.638 UTC [msp.identity] newIdentity -> DEBU 8d4 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d5 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] Validate -> DEBU 8d6 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] getCertificationChain -> DEBU 8d7 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [msp] hasOURole -> DEBU 8d8 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [msp] getCertificationChain -> DEBU 8d9 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] NewStandardValues -> DEBU 8da Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8db Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dc Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8de Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e0 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] NewStandardValues -> DEBU 8e1 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e2 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] NewStandardValues -> DEBU 8e3 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e4 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] validateMSP -> DEBU 8e5 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.643 UTC [msp] newBccspMsp -> DEBU 8e6 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.643 UTC [msp] New -> DEBU 8e7 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:19.644 UTC [msp] Setup -> DEBU 8e8 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:19.644 UTC [msp.identity] newIdentity -> DEBU 8e9 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.645 UTC [msp.identity] newIdentity -> DEBU 8ea Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Validate -> DEBU 8eb MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ec Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ed MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:19.646 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f8 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f9 Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fa Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fb Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fc Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fd Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fe Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8ff Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 900 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 901 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 902 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Group] /Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [peer] processChannelConfigTx -> DEBU 741 channelConfig=sequence:3 channel_group:<groups:<key:"Application" value:<version:1 groups:<key:"Org1MSP" value:<version:1 values:<key:"AnchorPeers" value:<value:"\n\033\n\026peer0.org1.example.com\020\2137" mod_policy:"Admins" > > values:<key:"MSP" value:<value:"\022\363!\n\007Org1MSP\022\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\nZ\332\r\010\001\022\352\006\n\337\006-----BEGIN CERTIFICATE-----\nMIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y\naZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\na7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw\nRAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\006client\032\350\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Org2MSP" value:<version:1 values:<key:"AnchorPeers" value:<value:"\n\033\n\026peer0.org2.example.com\020\2137" mod_policy:"Admins" > > values:<key:"MSP" value:<value:"\022\377!\n\007Org2MSP\022\343\006-----BEGIN CERTIFICATE-----\nMIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O\nA1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\nfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw\nRQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\nZ\342\r\010\001\022\356\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\006client\032\354\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"ACLs" value:<value:"\n.\n\014peer/Propose\022\036\n\034/Channel/Application/Writers\n4\n\022cscc/GetConfigTree\022\036\n\034/Channel/Application/Readers\nF\n$_lifecycle/CommitChaincodeDefinition\022\036\n\034/Channel/Application/Writers\nF\n$_lifecycle/QueryNamespaceDefinitions\022\036\n\034/Channel/Application/Readers\n5\n\023event/FilteredBlock\022\036\n\034/Channel/Application/Readers\n7\n\025lscc/GetChaincodeData\022\036\n\034/Channel/Application/Readers\n?\n\035cscc/SimulateConfigTreeUpdate\022\036\n\034/Channel/Application/Readers\n6\n\024lscc/ChaincodeExists\022\036\n\034/Channel/Application/Readers\n5\n\023cscc/GetConfigBlock\022\036\n\034/Channel/Application/Readers\n9\n\027qscc/GetTransactionByID\022\036\n\034/Channel/Application/Readers\n7\n\025qscc/GetBlockByNumber\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByHash\022\036\n\034/Channel/Application/Readers\nE\n#_lifecycle/QueryChaincodeDefinition\022\036\n\034/Channel/Application/Readers\n3\n\021qscc/GetChainInfo\022\036\n\034/Channel/Application/Readers\n;\n\031peer/ChaincodeToChaincode\022\036\n\034/Channel/Application/Readers\n@\n\036lscc/GetInstantiatedChaincodes\022\036\n\034/Channel/Application/Readers\n8\n\026lscc/GetDeploymentSpec\022\036\n\034/Channel/Application/Readers\n-\n\013event/Block\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByTxID\022\036\n\034/Channel/Application/Readers" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"LifecycleEndorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Orderer" value:<groups:<key:"OrdererOrg" value:<values:<key:"MSP" value:<value:"\022\267\023\n\nOrdererMSP\022\302\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n\"\201\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\317\006-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BatchSize" value:<value:"\010\364\003\020\200\200\200\005\030\200\200\200\001" mod_policy:"Admins" > > values:<key:"BatchTimeout" value:<value:"\n\0022s" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"ChannelRestrictions" value:<mod_policy:"Admins" > > values:<key:"ConsensusType" value:<value:"\n\010etcdraft\022\224*\n\375\r\n\024orderer0.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer1.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer2.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\022\022\n\005500ms\020\n\030\001 \005(\200\200\200\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"BlockValidation" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BlockDataHashingStructure" value:<value:"\010\377\377\377\377\017" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"Consortium" value:<value:"\n\020SampleConsortium" mod_policy:"Admins" > > values:<key:"HashingAlgorithm" value:<value:"\n\006SHA256" mod_policy:"Admins" > > values:<key:"OrdererAddresses" value:<value:"\n\031orderer0.example.com:7050\n\031orderer1.example.com:7050\n\031orderer2.example.com:7050" mod_policy:"/Channel/Orderer/Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > "
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 744 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] Done -> DEBU 745 Done with transaction simulation / query execution []"
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 746 Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [valinternal] ApplyWriteSet -> DEBU 749 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035c0700)}"
peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74a validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74b postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74c ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [kvledger] CommitWithPvtData -> DEBU 74d [businesschannel] Committing block [2] to storage"
peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [ledgerstorage] CommitWithPvtData -> DEBU 74e Writing block [2] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [msp.identity] newIdentity -> DEBU 747 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe
peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c
peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI
peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 74f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15100F "
peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 750 Sign: digest: 1C9F0D7EF98B17E45B15C5CD54742784DD5E737AEDA124D37E38F589075E5CF6 "
peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 751 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 752 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:22.642 UTC [msp] DeserializeIdentity -> DEBU 753 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.642 UTC [gossip.comm] Send -> DEBU 754 Entering, sending GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.643 UTC [gossip.comm] sendToEndpoint -> DEBU 755 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.643 UTC [gossip.comm] createConnection -> DEBU 756 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 757 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 758 scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] UpdateState -> DEBU 759 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] switchBalancer -> DEBU 75a ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:27:22.645 UTC [grpc] HandleSubConnStateChange -> DEBU 75b pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [grpc] infof -> DEBU 748 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.648 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.650 UTC [grpc] HandleSubConnStateChange -> DEBU 75d pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, READY"
peer0.org1.example.com | "2019-05-02 09:27:22.651 UTC [fsblkstorage] indexBlock -> DEBU 75e Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets=
peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22737
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 75f txid [] is a duplicate of a previous tx. Not indexing in txid-index"
peer0.org1.example.com | "2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 760 Adding txLoc [fileSuffixNum=0, offset=47697, bytesLength=22737] for tx number:[0] ID: [] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 761 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 762 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [gossip.comm] authenticateRemotePeer -> DEBU 763 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.657 UTC [fsblkstorage] updateCheckpoint -> DEBU 764 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71372], isChainEmpty=[false], lastBlockNumber=[2]"
peer0.org1.example.com | "2019-05-02 09:27:22.657 UTC [pvtdatastorage] Commit -> DEBU 765 Committing private data for block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.658 UTC [gossip.comm] authenticateRemotePeer -> DEBU 766 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.658 UTC [msp] DeserializeIdentity -> DEBU 767 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.659 UTC [msp] Validate -> DEBU 768 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.659 UTC [pvtdatastorage] Commit -> DEBU 769 Committed private data for block [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [kvledger] CommitWithPvtData -> DEBU 76a [businesschannel] Committing block [2] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76b lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76c Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 76d Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76e Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [stateleveldb] ApplyUpdates -> DEBU 76f Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]"
peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [msp] getCertificationChain -> DEBU 770 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 771 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [msp] DeserializeIdentity -> DEBU 772 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 773 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [msp] DeserializeIdentity -> DEBU 774 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 776 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 777 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 778 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 779 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 77a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func1 -> DEBU 77b 0xc0036aac60 gate 1556789242662578600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77c 0xc0036aac60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77d 0xc0036aac60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77e 0xc0036aac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.663 UTC [cauthdsl] func2 -> DEBU 77f 0xc0036aac60 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [cauthdsl] func1 -> DEBU 780 0xc0036aac60 gate 1556789242662578600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 781 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func1 -> DEBU 784 0xc0036ab4c0 gate 1556789242665023100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 785 0xc0036ab4c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 786 0xc0036ab4c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 787 Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [msp] Validate -> DEBU 788 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:22.666 UTC [msp] getCertificationChain -> DEBU 789 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [lockbasedtxmgr] Commit -> DEBU 78a Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78b Preparing potential purge list working-set for expiringAtBlk [3]"
peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [leveldbhelper] GetIterator -> DEBU 78c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78d No expiry entry found for expiringAtBlk [3]"
peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [lockbasedtxmgr] func1 -> DEBU 78e launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 790 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 791 Skipping transaction [0] since it is not an endorsement transaction"
peer0.org1.example.com | "2019-05-02 09:27:22.669 UTC [cauthdsl] func2 -> DEBU 792 0xc0036ab4c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.669 UTC [msp.identity] Verify -> DEBU 793 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [msp.identity] Verify -> DEBU 794 Verify: sig = 00000000 30 45 02 21 00 ab 62 8d ce e2 3e 89 f0 9f d4 05 |0E.!..b...>.....|
peer0.org1.example.com | 00000010 a0 e4 b0 bd ba df 3b 90 60 6f 6e 2c e5 45 a9 36 |......;.`on,.E.6|
peer0.org1.example.com | 00000020 c3 7b 22 44 0c 02 20 05 52 39 fe 47 57 e5 d1 94 |.{"D.. .R9.GW...|
peer0.org1.example.com | 00000030 49 bf d0 a6 18 a6 f9 16 0d 0c 8b dd 22 99 a6 3f |I..........."..?|
peer0.org1.example.com | 00000040 e1 ab 82 b0 48 3a 73 |....H:s|"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [cauthdsl] func2 -> DEBU 795 0xc0036ab4c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [cauthdsl] func1 -> DEBU 796 0xc0036ab4c0 gate 1556789242665023100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 797 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 798 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 799 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 79a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 79b Authenticated 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] createConnection -> DEBU 79c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] sendToEndpoint -> DEBU 79d Exiting"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.channelconfig] LogSanityChecks -> DEBU 932 As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 933 As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 934 Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 935 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 936 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 937 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 938 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 939 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93a As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93b As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93c As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93d Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93e Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93f Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 940 Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [policies] Manager -> DEBU 941 Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.channelconfig] LogSanityChecks -> DEBU 942 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 943 Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 944 Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] func1 -> DEBU 945 Executing callback to update root CAs"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 946 updating root CAs for channel [businesschannel]"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 947 adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 948 adding app root CAs for MSP [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 949 adding orderer root CAs for MSP [OrdererMSP]"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94a [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1"
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94c Sign: plaintext: 0A020801120B0A090A03010203100418...683F1999831A1C0CDF0D984CFEC05FF5 "
orderer0.example.com | "2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94d Sign: digest: 344DC25EA27E63D9B62219B26D45D3F996010DBE9F55CAC16F8C5001BA77DBAC "
orderer0.example.com | "2019-05-02 09:27:19.667 UTC [fsblkstorage] indexBlock -> DEBU 94e Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets=
orderer0.example.com | txId= locPointer=offset=71, bytesLength=22679
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:19.670 UTC [fsblkstorage] updateCheckpoint -> DEBU 94f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47625], isChainEmpty=[false], lastBlockNumber=[1]"
orderer0.example.com | "2019-05-02 09:27:19.670 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 950 [channel: businesschannel] Wrote block [1]"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.comm] func1 -> DEBU 79e Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 79f Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 7a0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a1 Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [msp.identity] Verify -> DEBU 7a3 Verify: digest = 00000000 3b 8b fe b5 67 e7 b7 5f 1e 0d b2 9d eb 20 ed 14 |;...g.._..... ..|
peer0.org1.example.com | 00000010 02 ff 66 cd 4f c7 16 7c 04 31 5d 70 96 2c fe 42 |..f.O..|.1]p.,.B|"
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a4 Verify: sig = 00000000 30 44 02 20 41 71 ce b9 93 60 a2 97 82 35 e8 86 |0D. Aq...`...5..|
peer0.org1.example.com | 00000010 a8 ef 6c 1e 44 4f 13 a9 dc 4f 2b 82 f8 95 7d 80 |..l.DO...O+...}.|
peer0.org1.example.com | 00000020 f0 40 bc 6b 02 20 74 8a 58 4d ba 7e 10 de e5 35 |.@.k. t.XM.~...5|
peer0.org1.example.com | 00000030 7e 39 05 53 0a 15 70 18 73 53 24 0c c6 c9 e6 fd |~9.S..p.sS$.....|
peer0.org1.example.com | 00000040 c8 d0 bc 01 d2 fb |......|"
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a6 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556789229135374800, 19 but got ts: inc_num:1556789229135374800 seq_num:18 "
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a9 Verify: digest = 00000000 1c 9f 0d 7e f9 8b 17 e4 5b 15 c5 cd 54 74 27 84 |...~....[...Tt'.|
peer0.org1.example.com | 00000010 dd 5e 73 7a ed a1 24 d3 7e 38 f5 89 07 5e 5c f6 |.^sz..$.~8...^\.|"
peer0.org1.example.com | "2019-05-02 09:27:22.677 UTC [msp.identity] Verify -> DEBU 7aa Verify: sig = 00000000 30 45 02 21 00 da 21 68 1c 3b 3f 24 7b aa 1e 84 |0E.!..!h.;?${...|
peer0.org1.example.com | 00000010 79 a0 af 8c 08 c9 fc 78 6a a4 73 e5 0e c3 07 a9 |y......xj.s.....|
peer0.org1.example.com | 00000020 7b 3c 8b 43 97 02 20 46 bb 25 39 92 ed 83 f7 70 |{<.C.. F.%9....p|
peer0.org1.example.com | 00000030 7f 59 f5 33 e1 49 fb ff 76 fb 24 0e d6 19 e9 a9 |.Y.3.I..v.$.....|
peer0.org1.example.com | 00000040 51 a0 89 cf cc 9b f1 |Q......|"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ab Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] isSentByMe -> DEBU 7ac Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ad Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7ae Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [historyleveldb] Commit -> DEBU 7af Channel [businesschannel]: Updates committed to history database for blockNo [2]"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [kvledger] CommitWithPvtData -> INFO 7b0 [businesschannel] Committed block [2] with 1 transaction(s) in 46ms (state_validation=7ms block_commit=20ms state_commit=8ms)"
peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [msp] DeserializeIdentity -> DEBU 7b1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b2 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020803 "
peer0.org1.example.com | "2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b3 Sign: digest: 3811DE16E7CAE6E4D211B6AA1B4BFDD46D07171C5DDD92B8D5C1F5664EDB62AD "
peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [gossip.state] commitBlock -> DEBU 7b4 [businesschannel] Committed block [2] with 1 transaction(s)"
orderer0.example.com | "2019-05-02 09:27:19.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU 951 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 952 Sending msg of 28 bytes to 3 on channel testchainid took 21µs"
orderer0.example.com | "2019-05-02 09:27:19.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180µs "
orderer0.example.com | "2019-05-02 09:27:19.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 954 Sending msg of 28 bytes to 2 on channel businesschannel took 53.6µs"
orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 955 Sending msg of 28 bytes to 3 on channel businesschannel took 62.9µs"
orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 956 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs "
orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 957 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.4µs "
orderer0.example.com | "2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 958 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 959 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95b Sending msg of 28 bytes to 3 on channel testchainid took 167.1µs"
orderer0.example.com | "2019-05-02 09:27:20.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 323.4µs "
orderer0.example.com | "2019-05-02 09:27:20.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95d Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs"
orderer0.example.com | "2019-05-02 09:27:20.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95e Sending msg of 28 bytes to 3 on channel businesschannel took 42.4µs"
orderer0.example.com | "2019-05-02 09:27:20.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.1µs "
orderer0.example.com | "2019-05-02 09:27:20.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 960 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9664ms "
orderer0.example.com | "2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 961 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 962 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 963 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 964 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs"
orderer0.example.com | "2019-05-02 09:27:20.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 965 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs "
orderer0.example.com | "2019-05-02 09:27:20.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 966 Sending msg of 28 bytes to 2 on channel businesschannel took 383.9µs"
orderer0.example.com | "2019-05-02 09:27:20.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 968 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs"
orderer0.example.com | "2019-05-02 09:27:20.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 967 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.3µs "
orderer0.example.com | "2019-05-02 09:27:20.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 969 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 476.7µs "
orderer0.example.com | "2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96d Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs"
orderer0.example.com | "2019-05-02 09:27:21.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 429.5µs "
orderer0.example.com | "2019-05-02 09:27:21.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96f Sending msg of 28 bytes to 2 on channel businesschannel took 38.5µs"
orderer0.example.com | "2019-05-02 09:27:21.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 970 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 578.8µs "
orderer0.example.com | "2019-05-02 09:27:21.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 971 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs"
orderer0.example.com | "2019-05-02 09:27:21.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 972 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.6µs "
orderer0.example.com | "2019-05-02 09:27:21.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 973 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 974 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 975 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 976 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs"
peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [cauthdsl] func1 -> DEBU 7bb 0xc0036def40 gate 1556789242681876900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bc 0xc0036def40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bd 0xc0036def40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7be 0xc0036def40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bf 0xc0036def40 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func1 -> DEBU 7c0 0xc0036def40 gate 1556789242681876900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func1 -> DEBU 7c4 0xc0036df780 gate 1556789242683458700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c5 0xc0036df780 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c6 0xc0036df780 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c7 0xc0036df780 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [msp.identity] Verify -> DEBU 7c8 Verify: digest = 00000000 14 41 ad e5 11 61 77 f1 7c 69 d6 60 27 6f 11 2a |.A...aw.|i.`'o.*|
peer0.org1.example.com | 00000010 9d 8a 5f f1 c4 6d a7 50 72 ea a6 70 3e 70 f9 12 |.._..m.Pr..p>p..|"
peer0.org1.example.com | "2019-05-02 09:27:22.684 UTC [msp.identity] Verify -> DEBU 7c9 Verify: sig = 00000000 30 44 02 20 2d f7 2b 2f 8f dd 00 67 4d 49 02 10 |0D. -.+/...gMI..|
peer0.org1.example.com | 00000010 b4 5b 34 d9 5d ff 55 09 4a de 66 69 b1 53 44 0b |.[4.].U.J.fi.SD.|
peer0.org1.example.com | 00000020 f5 19 40 5b 02 20 67 ee 0f ad 63 d0 76 53 87 cd |..@[. g...c.vS..|
peer0.org1.example.com | 00000030 50 6f 20 bd 6e 5b 64 2a 6d 05 70 d4 a6 79 73 a7 |Po .n[d*m.p..ys.|
peer0.org1.example.com | 00000040 2e 6b ce 70 79 db |.k.py.|"
peer0.org1.example.com | "2019-05-02 09:27:22.684 UTC [cauthdsl] func2 -> DEBU 7ca 0xc0036df780 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [cauthdsl] func1 -> DEBU 7cb 0xc0036df780 gate 1556789242683458700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7ce Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}"
peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.847 UTC [comm.grpc.server] 1 -> INFO 7d6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.846Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.8µs
peer0.org1.example.com | "2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:42014"
peer0.org1.example.com | "2019-05-02 09:27:22.852 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42014"
peer0.org1.example.com | "2019-05-02 09:27:22.852 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.853 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [msp] DeserializeIdentity -> DEBU 7df Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 977 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 251.5µs "
orderer0.example.com | "2019-05-02 09:27:21.737 UTC [orderer.common.server] Deliver -> DEBU 978 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:21.738 UTC [common.deliver] Handle -> DEBU 979 Starting new deliver loop for 172.18.0.8:57182"
orderer0.example.com | "2019-05-02 09:27:21.739 UTC [common.deliver] Handle -> DEBU 97a Attempting to read seek info message from 172.18.0.8:57182"
orderer0.example.com | "2019-05-02 09:27:21.754 UTC [orderer.common.server] Broadcast -> DEBU 97b Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] Handle -> DEBU 97c Starting new broadcast loop for 172.18.0.8:57184"
orderer0.example.com | "2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 97d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57184"
orderer0.example.com | "2019-05-02 09:27:21.756 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 97e Processing config update message for channel businesschannel"
orderer0.example.com | "2019-05-02 09:27:21.756 UTC [policies] Evaluate -> DEBU 97f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 980 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 981 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 982 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 983 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.759 UTC [msp] DeserializeIdentity -> DEBU 984 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.759 UTC [msp.identity] newIdentity -> DEBU 985 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.761 UTC [cauthdsl] func1 -> DEBU 986 0xc000970f30 gate 1556789241761270700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.761 UTC [cauthdsl] func2 -> DEBU 987 0xc000970f30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:21.762 UTC [cauthdsl] func2 -> DEBU 988 0xc000970f30 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.762 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 989 Checking if identity satisfies MEMBER role for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.762 UTC [msp] Validate -> DEBU 98a MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.763 UTC [msp] getCertificationChain -> DEBU 98b MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.764 UTC [cauthdsl] func2 -> DEBU 98c 0xc000970f30 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98d Verify: digest = 00000000 e4 18 59 98 0d 3b a7 30 be cc 46 08 ec 74 fd f2 |..Y..;.0..F..t..|
orderer0.example.com | 00000010 89 8b c4 f0 ec d1 42 e7 29 be db 21 86 0a 03 30 |......B.)..!...0|"
orderer0.example.com | "2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98e Verify: sig = 00000000 30 45 02 21 00 d3 77 a5 76 87 7d ad 38 c8 e3 87 |0E.!..w.v.}.8...|
orderer0.example.com | 00000010 ac b0 f9 03 ba af b9 cc 72 47 5e 58 24 aa 04 4c |........rG^X$..L|
orderer0.example.com | 00000020 2e e6 c9 13 03 02 20 16 a7 9b 44 cc 32 92 1d a7 |...... ...D.2...|
orderer0.example.com | 00000030 93 3c ca cf 44 03 c3 03 99 d4 ff 75 03 df c0 51 |.<..D......u...Q|
orderer0.example.com | 00000040 9a 6f 3e fa e0 10 c9 |.o>....|"
orderer0.example.com | "2019-05-02 09:27:21.766 UTC [cauthdsl] func2 -> DEBU 98f 0xc000970f30 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:21.766 UTC [cauthdsl] func1 -> DEBU 990 0xc000970f30 gate 1556789241761270700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:21.766 UTC [policies] Evaluate -> DEBU 991 Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 992 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 993 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 995 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e1 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e2 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [policies] Evaluate -> DEBU 7e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [cauthdsl] func1 -> DEBU 7e6 0xc003750000 gate 1556789242856527700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [cauthdsl] func2 -> DEBU 7e7 0xc003750000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e8 0xc003750000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e9 0xc003750000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7ea 0xc003750000 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003750000 gate 1556789242856527700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func1 -> DEBU 7ef 0xc003750840 gate 1556789242859150900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f0 0xc003750840 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f1 0xc003750840 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [cauthdsl] func2 -> DEBU 7f2 0xc003750840 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f3 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f4 Verify: sig = 00000000 30 45 02 21 00 d9 f3 24 4b 1f 2b 0d 86 c7 ff 75 |0E.!...$K.+....u|
peer0.org1.example.com | 00000010 d4 c2 df 10 b1 88 fe e2 9a f1 dc 01 22 09 b3 02 |............"...|
peer0.org1.example.com | 00000020 10 7f 07 b5 3d 02 20 1c 1a c6 fd 84 ba ee 71 63 |....=. .......qc|
peer0.org1.example.com | 00000030 51 8b 19 3c 7f 4d d6 b8 f3 bf 8f 1c 6b 64 a5 7d |Q..<.M......kd.}|
peer0.org1.example.com | 00000040 d9 b5 47 f2 fd 7f ab |..G....|"
peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003750840 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [cauthdsl] func1 -> DEBU 7f7 0xc003750840 gate 1556789242859150900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [grpc] infof -> DEBU 7f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.864 UTC [gossip.comm] func1 -> DEBU 7f8 Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.865 UTC [gossip.gossip] handleMessage -> DEBU 7f9 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.866 UTC [gossip.gossip] handleMessage -> DEBU 7fa Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7fb Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.867 UTC [msp] DeserializeIdentity -> DEBU 7fd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.868 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ff Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 800 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.870 UTC [policies] Evaluate -> DEBU 801 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.871 UTC [policies] Evaluate -> DEBU 802 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [policies] Evaluate -> DEBU 803 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [cauthdsl] func1 -> DEBU 804 0xc003768970 gate 1556789242872413800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [cauthdsl] func2 -> DEBU 805 0xc003768970 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.873 UTC [cauthdsl] func2 -> DEBU 806 0xc003768970 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 807 0xc003768970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 808 0xc003768970 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func1 -> DEBU 809 0xc003768970 gate 1556789242872413800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [cauthdsl] func1 -> DEBU 80d 0xc0037691b0 gate 1556789242875929300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [cauthdsl] func2 -> DEBU 80e 0xc0037691b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 80f 0xc0037691b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 810 0xc0037691b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 811 Verify: digest = 00000000 19 53 48 52 4d 2a 2d 46 cf 02 5d 8f c4 06 81 99 |.SHRM*-F..].....|
peer0.org1.example.com | 00000010 d1 b6 eb 51 e5 93 32 c8 db 0a d1 4f 3d 43 ba 1c |...Q..2....O=C..|"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 812 Verify: sig = 00000000 30 45 02 21 00 e3 e7 2e ba d7 30 6c 06 6d ba 8d |0E.!......0l.m..|
peer0.org1.example.com | 00000010 7c 44 88 d7 e8 e3 be 77 e8 91 16 a9 bf af ff ff ||D.....w........|
peer0.org1.example.com | 00000020 e3 f7 8c aa d2 02 20 5f f8 9d 5b ec 92 ab 90 15 |...... _..[.....|
peer0.org1.example.com | 00000030 14 cc 8c a8 2a a2 95 6f 6e 3e 42 29 79 b1 43 a8 |....*..on>B)y.C.|
peer0.org1.example.com | 00000040 a2 d7 b2 83 29 ec b6 |....)..|"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 813 0xc0037691b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func1 -> DEBU 814 0xc0037691b0 gate 1556789242875929300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 815 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 816 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 817 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 819 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes"
orderer0.example.com | "2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.775 UTC [common.configtx] verifyDeltaSet -> DEBU 9a8 Processing change to key: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.775 UTC [common.configtx] policyForItem -> DEBU 9a9 Getting policy for item Org2MSP with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9aa Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ab Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ac Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ad Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ae Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9af Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b0 Manager Channel/Application looking up path [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b1 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b2 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b3 Manager Channel/Application/Org2MSP looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Evaluate -> DEBU 9b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:21.777 UTC [cauthdsl] func1 -> DEBU 9b5 0xc000cd87d0 gate 1556789241777974000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b6 0xc000cd87d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b7 0xc000cd87d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9b8 Checking if identity satisfies ADMIN role for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b9 0xc000cd87d0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9ba Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....|
orderer0.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9bb Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l|
orderer0.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...|
orderer0.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...|
orderer0.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....|
orderer0.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9bc 0xc000cd87d0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func1 -> DEBU 9bd 0xc000cd87d0 gate 1556789241777974000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9be Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] verifyDeltaSet -> DEBU 9c0 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c1 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c2 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c3 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c4 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c5 Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c6 Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c7 Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c8 Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9c9 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ca Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cb Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cc Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cd Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ce Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cf Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d0 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d1 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d2 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d3 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d4 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 "
peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 "
peer0.org1.example.com | "2019-05-02 09:27:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 81d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:22.881 UTC [gossip.discovery] learnExistingMembers -> DEBU 81e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 81f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 820 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.882 UTC [gossip.discovery] sendMemResponse -> DEBU 821 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:22.883 UTC [msp] DeserializeIdentity -> DEBU 822 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.884 UTC [msp] DeserializeIdentity -> DEBU 823 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.886 UTC [gossip.comm] Send -> DEBU 824 Entering, sending GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.discovery] sendMemResponse -> DEBU 825 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 826 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 827 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.864 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 82a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [policies] Evaluate -> DEBU 82b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82c Authenticated 172.18.0.9:42014"
peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] GossipStream -> DEBU 82d Servicing 172.18.0.9:42014"
peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] serviceConnection -> DEBU 82e Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] writeToStream -> DEBU 82f Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.892 UTC [gossip.comm] readFromStream -> DEBU 830 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:27:22.892 UTC [grpc] infof -> DEBU 831 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.893 UTC [gossip.comm] readFromStream -> DEBU 832 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:27:22.893 UTC [gossip.comm] func2 -> DEBU 833 Client 172.18.0.9:42014 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:22.894 UTC [comm.grpc.server] 1 -> INFO 834 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.849Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.5551ms
peer0.org1.example.com | "2019-05-02 09:27:22.895 UTC [gossip.comm] writeToStream -> DEBU 835 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.916 UTC [comm.grpc.server] 1 -> INFO 836 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.916Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119.9µs
peer0.org1.example.com | "2019-05-02 09:27:22.919 UTC [msp.identity] Sign -> DEBU 837 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.921 UTC [msp.identity] Sign -> DEBU 838 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.922 UTC [gossip.comm] authenticateRemotePeer -> DEBU 839 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42016"
peer0.org1.example.com | "2019-05-02 09:27:22.923 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42016"
peer0.org1.example.com | "2019-05-02 09:27:22.923 UTC [msp] DeserializeIdentity -> DEBU 83b Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d5 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d6 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d7 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9d8 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d9 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9da Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9db Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dc Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dd Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9de Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9df Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e0 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e1 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e2 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e3 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e4 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] Validate -> DEBU 9e5 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] validateMSP -> DEBU 9e6 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] newBccspMsp -> DEBU 9e7 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] New -> DEBU 9e8 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] Setup -> DEBU 9e9 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9ea Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9eb Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.781 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ec Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.784 UTC [msp] Validate -> DEBU 9ed MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.785 UTC [msp] getCertificationChain -> DEBU 9ee MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.785 UTC [msp] hasOURole -> DEBU 9ef MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:21.786 UTC [msp] getCertificationChain -> DEBU 9f0 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f1 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f2 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f3 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f4 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] Validate -> DEBU 9f5 Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] validateMSP -> DEBU 9f6 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] newBccspMsp -> DEBU 9f7 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] New -> DEBU 9f8 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] Setup -> DEBU 9f9 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.790 UTC [msp.identity] newIdentity -> DEBU 9fa Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [msp] DeserializeIdentity -> DEBU 83d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.925 UTC [msp] DeserializeIdentity -> DEBU 83f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 841 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 842 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [cauthdsl] func1 -> DEBU 846 0xc0037d4250 gate 1556789242927718400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [cauthdsl] func2 -> DEBU 847 0xc0037d4250 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 848 0xc0037d4250 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 849 0xc0037d4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 84a 0xc0037d4250 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [cauthdsl] func1 -> DEBU 84b 0xc0037d4250 gate 1556789242927718400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.791 UTC [msp.identity] newIdentity -> DEBU 9fb Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.792 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9fc Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.792 UTC [msp] Validate -> DEBU 9fd MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU 9fe MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] hasOURole -> DEBU 9ff MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU a00 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] NewStandardValues -> DEBU a01 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a02 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a03 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a04 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a05 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a06 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:21.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU a07 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.796 UTC [common.channelconfig] NewStandardValues -> DEBU a08 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a09 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] NewStandardValues -> DEBU a0a Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0b Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] validateMSP -> DEBU a0c Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [msp] newBccspMsp -> DEBU a0d Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.797 UTC [msp] New -> DEBU a0e Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp] Setup -> DEBU a0f Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a10 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a11 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | "2019-05-02 09:27:22.930 UTC [policies] Evaluate -> DEBU 84e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.931 UTC [cauthdsl] func1 -> DEBU 84f 0xc0037d4a90 gate 1556789242931216300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.931 UTC [cauthdsl] func2 -> DEBU 850 0xc0037d4a90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 851 0xc0037d4a90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 852 0xc0037d4a90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.934 UTC [grpc] infof -> DEBU 853 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:22.934 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:27:22.936 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 32 8d c7 f6 55 11 1e 4e d4 0c 84 34 |0D. 2...U..N...4|
peer0.org1.example.com | 00000010 d6 46 44 f0 f8 59 72 96 fd 04 c5 e7 92 54 01 bc |.FD..Yr......T..|
peer0.org1.example.com | 00000020 3d 36 5b 60 02 20 07 02 fa a4 60 3f 54 5d 02 bb |=6[`. ....`?T]..|
peer0.org1.example.com | 00000030 9e 62 be 74 95 4e 28 3b 72 6c 22 1c bc ee b5 15 |.b.t.N(;rl".....|
peer0.org1.example.com | 00000040 65 e6 32 15 75 be |e.2.u.|"
peer0.org1.example.com | "2019-05-02 09:27:22.938 UTC [cauthdsl] func2 -> DEBU 856 0xc0037d4a90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.939 UTC [cauthdsl] func1 -> DEBU 857 0xc0037d4a90 gate 1556789242931216300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.940 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.941 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.942 UTC [policies] Evaluate -> DEBU 85a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.943 UTC [policies] Evaluate -> DEBU 85b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.944 UTC [gossip.comm] authenticateRemotePeer -> DEBU 85c Authenticated 172.18.0.9:42016"
peer0.org1.example.com | "2019-05-02 09:27:22.944 UTC [gossip.comm] GossipStream -> DEBU 85d Servicing 172.18.0.9:42016"
peer0.org1.example.com | "2019-05-02 09:27:22.945 UTC [gossip.comm] readFromStream -> DEBU 85e Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:27:22.945 UTC [gossip.comm] func2 -> DEBU 85f Client 172.18.0.9:42016 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:22.946 UTC [gossip.comm] writeToStream -> DEBU 860 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:22.946 UTC [comm.grpc.server] 1 -> INFO 861 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.918Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.2379ms
peer0.org1.example.com | "2019-05-02 09:27:22.958 UTC [comm.grpc.server] 1 -> INFO 862 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.957Z grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=179.4µs
peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 863 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 864 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [gossip.comm] authenticateRemotePeer -> DEBU 865 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42018"
peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 866 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42018"
peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 867 Obtaining identity"
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Validate -> DEBU a12 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a13 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a14 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a15 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a16 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a17 Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a18 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a19 Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1a Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1b Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1c Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1d Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1e Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1f Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a20 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a21 Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a22 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a23 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 868 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 869 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [msp] DeserializeIdentity -> DEBU 86b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [policies] Evaluate -> DEBU 86f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 870 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func1 -> DEBU 872 0xc003807ad0 gate 1556789242963441400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 873 0xc003807ad0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 874 0xc003807ad0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 875 0xc003807ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 876 0xc003807ad0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 877 0xc003807ad0 gate 1556789242963441400 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a24 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a25 Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a26 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a27 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a28 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a29 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2a Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2b Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:21.801 UTC [common.configtx] addToMap -> DEBU a2c Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2d Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2e Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a30 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a31 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a32 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5a As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5b As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5c Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 87a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 87b 0xc003828310 gate 1556789242964710200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87c 0xc003828310 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87d 0xc003828310 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87e 0xc003828310 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [msp.identity] Verify -> DEBU 87f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [msp.identity] Verify -> DEBU 880 Verify: sig = 00000000 30 44 02 20 1c 49 9b 3f 31 5b f2 93 84 1b 20 9b |0D. .I.?1[.... .|
peer0.org1.example.com | 00000010 1b a4 7f 89 fc f6 c3 f7 b0 6c 0a 3a cb 12 5d 32 |.........l.:..]2|
peer0.org1.example.com | 00000020 0f 6b e2 3f 02 20 23 1d cc b6 fc 5b 32 0f c0 9a |.k.?. #....[2...|
peer0.org1.example.com | 00000030 9b 4c 46 01 3d 9a 97 5f 77 9e e6 af a9 a7 52 96 |.LF.=.._w.....R.|
peer0.org1.example.com | 00000040 0e 79 6f d8 44 e7 |.yo.D.|"
peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [cauthdsl] func2 -> DEBU 881 0xc003828310 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [cauthdsl] func1 -> DEBU 882 0xc003828310 gate 1556789242964710200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [policies] Evaluate -> DEBU 883 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 884 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 885 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [policies] Evaluate -> DEBU 886 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [gossip.comm] authenticateRemotePeer -> DEBU 887 Authenticated 172.18.0.9:42018"
peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [gossip.comm] GossipStream -> DEBU 888 Servicing 172.18.0.9:42018"
peer0.org1.example.com | "2019-05-02 09:27:22.970 UTC [gossip.gossip] handleMessage -> DEBU 889 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.971 UTC [gossip.gossip] handleMessage -> DEBU 88a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 88b Got message: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 88c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [msp] DeserializeIdentity -> DEBU 88d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 88e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 88f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 890 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:22.977 UTC [policies] Evaluate -> DEBU 893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.977 UTC [cauthdsl] func1 -> DEBU 894 0xc003832a50 gate 1556789242977465500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.978 UTC [cauthdsl] func2 -> DEBU 895 0xc003832a50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 896 0xc003832a50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 897 0xc003832a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:22.980 UTC [cauthdsl] func2 -> DEBU 898 0xc003832a50 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [cauthdsl] func1 -> DEBU 899 0xc003832a50 gate 1556789242977465500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.982 UTC [policies] Evaluate -> DEBU 89c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:22.982 UTC [cauthdsl] func1 -> DEBU 89d 0xc003833290 gate 1556789242982602400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89e 0xc003833290 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89f 0xc003833290 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:22.984 UTC [cauthdsl] func2 -> DEBU 8a0 0xc003833290 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.984 UTC [msp.identity] Verify -> DEBU 8a1 Verify: digest = 00000000 fd 11 4d ee 68 00 e9 ca 1b 49 f9 92 f3 2d 42 8b |..M.h....I...-B.|
peer0.org1.example.com | 00000010 54 d9 e0 01 fb 83 45 c8 78 fd d1 40 90 fa 21 49 |T.....E.x..@..!I|"
peer0.org1.example.com | "2019-05-02 09:27:22.985 UTC [msp.identity] Verify -> DEBU 8a2 Verify: sig = 00000000 30 44 02 20 34 65 8c a6 3a 82 ef 99 4d 5d 73 05 |0D. 4e..:...M]s.|
peer0.org1.example.com | 00000010 46 93 df 67 10 73 3d 57 d5 07 92 bc 12 03 fd 2f |F..g.s=W......./|
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5d Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5e Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5f Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a60 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a61 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a62 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a63 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a64 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a65 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a66 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a67 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a68 Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a69 Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a6a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6b Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6c Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6d Sign: plaintext: 0AD2060A1B08011A0608F9EFAAE60522...0399D4FF7503DFC0519A6F3EFAE010C9 "
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6e Sign: digest: 28BE1EAFAC51AB90A5A66D7457C10ED8719A11DC4920A71DE7405F6DCC0EA568 "
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:21.805 UTC [policies] Evaluate -> DEBU a73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.806 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.807 UTC [msp.identity] newIdentity -> DEBU a75 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
peer0.org1.example.com | 00000020 b1 4c 5c 5f 02 20 1e 0d 35 99 e9 f5 ab d2 5d fa |.L\_. ..5.....].|
peer0.org1.example.com | 00000030 df eb 24 a3 d2 1c 30 f3 b7 94 f4 23 01 a8 f3 8e |..$...0....#....|
peer0.org1.example.com | 00000040 83 02 6a 68 9a f0 |..jh..|"
peer0.org1.example.com | "2019-05-02 09:27:22.986 UTC [cauthdsl] func2 -> DEBU 8a3 0xc003833290 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [cauthdsl] func1 -> DEBU 8a4 0xc003833290 gate 1556789242982602400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [gossip.discovery] handleAliveMessage -> DEBU 8a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ab updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 "
peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ac Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 "
peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ae Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 8af Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8b0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:22.998 UTC [gossip.discovery] sendMemResponse -> DEBU 8b1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [gossip.comm] Send -> DEBU 8b4 Entering, sending GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.discovery] sendMemResponse -> DEBU 8b7 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:23.111 UTC [comm.grpc.server] 1 -> INFO 8b8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.11Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=201µs
peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8b9 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8ba Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bb Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56894"
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.808 UTC [cauthdsl] func1 -> DEBU a76 0xc000f4a170 gate 1556789241808157000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a77 0xc000f4a170 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a78 0xc000f4a170 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a79 0xc000f4a170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:21.810 UTC [cauthdsl] func2 -> DEBU a7a 0xc000f4a170 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:21.810 UTC [cauthdsl] func1 -> DEBU a7b 0xc000f4a170 gate 1556789241808157000 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:21.810 UTC [policies] Evaluate -> DEBU a7c Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.811 UTC [cauthdsl] func1 -> DEBU a7f 0xc000f4b2b0 gate 1556789241811771100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a80 0xc000f4b2b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a81 0xc000f4b2b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a82 0xc000f4b2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:21.813 UTC [cauthdsl] func2 -> DEBU a83 0xc000f4b2b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:21.813 UTC [cauthdsl] func1 -> DEBU a84 0xc000f4b2b0 gate 1556789241811771100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:21.813 UTC [policies] Evaluate -> DEBU a85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] func1 -> DEBU a87 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]"
orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a88 Signature set did not satisfy policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:23.114 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bc Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56894"
peer0.org1.example.com | "2019-05-02 09:27:23.114 UTC [msp] DeserializeIdentity -> DEBU 8bd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.115 UTC [msp] DeserializeIdentity -> DEBU 8be Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.115 UTC [msp.identity] newIdentity -> DEBU 8bf Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c
peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv
peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr
peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:23.116 UTC [msp] Validate -> DEBU 8c0 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:23.116 UTC [msp] getCertificationChain -> DEBU 8c1 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [msp] DeserializeIdentity -> DEBU 8c3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c8 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c9 Got reader policy for channel [businesschannel] with flag [true]"
orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:21.816 UTC [policies] Evaluate -> DEBU a8c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
orderer0.example.com | "2019-05-02 09:27:21.816 UTC [cauthdsl] func1 -> DEBU a8d 0xc000f4bfc0 gate 1556789241816623000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.816 UTC [cauthdsl] func2 -> DEBU a8e 0xc000f4bfc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [policies] Evaluate -> DEBU 8ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [cauthdsl] func1 -> DEBU 8cd 0xc003899540 gate 1556789243120806800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [cauthdsl] func2 -> DEBU 8ce 0xc003899540 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8cf 0xc003899540 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d0 0xc003899540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d1 0xc003899540 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [cauthdsl] func1 -> DEBU 8d2 0xc003899540 gate 1556789243120806800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func1 -> DEBU 8d6 0xc003899da0 gate 1556789243123168200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d7 0xc003899da0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d8 0xc003899da0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d9 Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [msp] Validate -> DEBU 8da MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [msp] getCertificationChain -> DEBU 8db MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [cauthdsl] func2 -> DEBU 8dc 0xc003899da0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8dd Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8de Verify: sig = 00000000 30 44 02 20 3d 95 d0 1f 80 8f c6 4a dc 3e 2f aa |0D. =......J.>/.|
peer0.org1.example.com | 00000010 eb f9 5a aa 8a bc 21 20 51 8b d2 3c 15 fa d4 a8 |..Z...! Q..<....|
peer0.org1.example.com | 00000020 11 43 dd 1a 02 20 69 6a 4a 6a 7f fe 0c c6 15 03 |.C... ijJj......|
peer0.org1.example.com | 00000030 0a 4d 73 c3 ba d6 0c ae da 5b 95 a7 fb 60 35 0e |.Ms......[...`5.|
peer0.org1.example.com | 00000040 b6 85 9a bc f2 b5 |......|"
peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [cauthdsl] func2 -> DEBU 8df 0xc003899da0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [cauthdsl] func1 -> DEBU 8e0 0xc003899da0 gate 1556789243123168200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.129 UTC [policies] Evaluate -> DEBU 8e3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.131 UTC [policies] Evaluate -> DEBU 8e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.131 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8e5 Authenticated 172.18.0.5:56894"
peer0.org1.example.com | "2019-05-02 09:27:23.132 UTC [gossip.comm] GossipStream -> DEBU 8e6 Servicing 172.18.0.5:56894"
peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [gossip.comm] readFromStream -> DEBU 8e7 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [gossip.comm] func2 -> DEBU 8e8 Client 172.18.0.5:56894 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [comm.grpc.server] 1 -> INFO 8e9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.112Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.4386ms
peer0.org1.example.com | "2019-05-02 09:27:23.143 UTC [gossip.comm] writeToStream -> DEBU 8ea Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:23.143 UTC [grpc] infof -> DEBU 8eb transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:23.150 UTC [comm.grpc.server] 1 -> INFO 8ec unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.15Z grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=568.2µs
peer0.org1.example.com | "2019-05-02 09:27:23.152 UTC [msp.identity] Sign -> DEBU 8ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:23.153 UTC [msp.identity] Sign -> DEBU 8ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:23.153 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ef Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56896"
peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f0 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56896"
peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [msp] DeserializeIdentity -> DEBU 8f1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [policies] Evaluate -> DEBU 8fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [cauthdsl] func1 -> DEBU 8fc 0xc0039027d0 gate 1556789243158295500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [cauthdsl] func2 -> DEBU 8fd 0xc0039027d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.160 UTC [cauthdsl] func2 -> DEBU 8fe 0xc0039027d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 8ff 0xc0039027d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 900 0xc0039027d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [cauthdsl] func1 -> DEBU 901 0xc0039027d0 gate 1556789243158295500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 902 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 903 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.163 UTC [policies] Evaluate -> DEBU 904 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.164 UTC [cauthdsl] func1 -> DEBU 905 0xc0038af780 gate 1556789243164671300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 906 0xc0038af780 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 907 0xc0038af780 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 908 0xc0038af780 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 909 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 90a Verify: sig = 00000000 30 44 02 20 59 45 5d e8 5d 24 f9 9d b3 3b 40 ba |0D. YE].]$...;@.|
peer0.org1.example.com | 00000010 48 31 87 a6 31 59 7a 8b be 27 c3 f3 37 94 6c 20 |H1..1Yz..'..7.l |
peer0.org1.example.com | 00000020 9d e3 a0 fe 02 20 74 98 51 b1 87 d2 78 d7 aa e6 |..... t.Q...x...|
peer0.org1.example.com | 00000030 7e b2 38 4e 93 1d 61 9f 10 f8 8c 3d 00 e6 76 50 |~.8N..a....=..vP|
peer0.org1.example.com | 00000040 82 ac 8f 61 a4 97 |...a..|"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [cauthdsl] func2 -> DEBU 90b 0xc0038af780 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [cauthdsl] func1 -> DEBU 90c 0xc0038af780 gate 1556789243164671300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 910 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [gossip.comm] authenticateRemotePeer -> DEBU 911 Authenticated 172.18.0.5:56896"
orderer0.example.com | "2019-05-02 09:27:21.817 UTC [cauthdsl] func2 -> DEBU a8f 0xc000f4bfc0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.817 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a90 Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:21.817 UTC [msp] Validate -> DEBU a91 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.818 UTC [cauthdsl] func2 -> DEBU a92 0xc000f4bfc0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a93 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...|
orderer0.example.com | 00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|"
orderer0.example.com | "2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a94 Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..|
orderer0.example.com | 00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N|
orderer0.example.com | 00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..|
orderer0.example.com | 00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.|
orderer0.example.com | 00000040 69 13 32 1f 05 3e |i.2..>|"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [cauthdsl] func2 -> DEBU a95 0xc000f4bfc0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [cauthdsl] func1 -> DEBU a96 0xc000f4bfc0 gate 1556789241816623000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a97 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a99 Signature set satisfies policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9b Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.821 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a9d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57184"
orderer0.example.com | "2019-05-02 09:27:21.822 UTC [orderer.consensus.etcdraft] propose -> INFO a9e Created block [2], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:21.824 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a9f Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:21.824 UTC [common.deliver] Handle -> WARN aa0 Error reading from 172.18.0.8:57182: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:21.825 UTC [orderer.common.server] func1 -> DEBU aa4 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:21.827 UTC [comm.grpc.server] 1 -> INFO aa5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=90.0028ms
orderer0.example.com | "2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa1 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:21.825 UTC [orderer.common.broadcast] Handle -> WARN aa2 Error reading from 172.18.0.8:57184: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.common.server] func1 -> DEBU aa9 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:21.830 UTC [comm.grpc.server] 1 -> INFO aaa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=76.6966ms
orderer0.example.com | "2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa3 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:21.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa6 Sending msg of 22866 bytes to 2 on channel businesschannel took 24.1µs"
orderer0.example.com | "2019-05-02 09:27:21.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aab Sending msg of 22866 bytes to 3 on channel businesschannel took 19.7µs"
orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa7 Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer1.example.com(orderer1.example.com:7050) took 118.3µs "
orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.consensus.etcdraft] 2 -> DEBU aa8 Proposed block [2] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:21.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU aac Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer2.example.com(orderer2.example.com:7050) took 129.1µs "
orderer0.example.com | "2019-05-02 09:27:21.836 UTC [orderer.common.cluster.step] handleMessage -> DEBU aad Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.common.cluster.step] handleMessage -> DEBU aae Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aaf Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs"
orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ab0 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs"
orderer0.example.com | "2019-05-02 09:27:21.838 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.2µs "
orderer0.example.com | "2019-05-02 09:27:21.838 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ab2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:21.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.2µs "
orderer0.example.com | "2019-05-02 09:27:21.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.859 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:21.839 UTC [common.configtx] addToMap -> DEBU ab6 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab7 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab8 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU aba Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.171 UTC [gossip.comm] GossipStream -> DEBU 912 Servicing 172.18.0.5:56896"
peer0.org1.example.com | "2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 913 Entering, 172.18.0.5:56896 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 914 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [gossip.discovery] handleMsgFromComm -> DEBU 915 Got message: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 916 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [msp] DeserializeIdentity -> DEBU 917 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 918 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 919 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 91a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [policies] Evaluate -> DEBU 91d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func1 -> DEBU 91e 0xc003911640 gate 1556789243180251700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 91f 0xc003911640 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 920 0xc003911640 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 921 0xc003911640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 922 0xc003911640 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func1 -> DEBU 923 0xc003911640 gate 1556789243180251700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [policies] Evaluate -> DEBU 924 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 925 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func1 -> DEBU 927 0xc003911e80 gate 1556789243182363400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 928 0xc003911e80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 929 0xc003911e80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92a 0xc003911e80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92b Verify: digest = 00000000 18 43 a4 a2 92 99 84 99 c1 e5 db 1c cc e5 ba 99 |.C..............|
peer0.org1.example.com | 00000010 70 13 a6 19 5f ce a4 93 ee b0 cc 56 01 24 0e 5f |p..._......V.$._|"
peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92c Verify: sig = 00000000 30 45 02 21 00 d3 cf 39 98 e5 fd 5c 23 9a e6 78 |0E.!...9...\#..x|
peer0.org1.example.com | 00000010 c4 d4 d3 54 63 fb dc 8d b1 06 10 80 da 9e f9 f3 |...Tc...........|
peer0.org1.example.com | 00000020 c0 ae c2 d5 0d 02 20 4d b0 64 ec 8b ec 11 4c 28 |...... M.d....L(|
peer0.org1.example.com | 00000030 25 b8 3c ab 18 5f e5 a7 2b 53 88 82 89 6a fd 6e |%.<.._..+S...j.n|
peer0.org1.example.com | 00000040 c6 81 84 3e 98 26 fb |...>.&.|"
peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92d 0xc003911e80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [cauthdsl] func1 -> DEBU 92e 0xc003911e80 gate 1556789243182363400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 92f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.866 UTC [common.configtx] addToMap -> DEBU abd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abe Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abf Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac0 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac7 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac8 Processing change to key: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] policyForItem -> DEBU ac9 Getting policy for item Org2MSP with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU aca Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acb Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acc Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acd Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ace Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acf Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ad0 Manager Channel/Application looking up path [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad1 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad2 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad3 Manager Channel/Application/Org2MSP looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Evaluate -> DEBU ad4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func1 -> DEBU ad5 0xc00104c7f0 gate 1556789241869584500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad6 0xc00104c7f0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad7 0xc00104c7f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad8 0xc00104c7f0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:21.869 UTC [msp.identity] Verify -> DEBU ad9 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....|
orderer0.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|"
orderer0.example.com | "2019-05-02 09:27:21.870 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l|
orderer0.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...|
orderer0.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...|
orderer0.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....|
orderer0.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|"
orderer0.example.com | "2019-05-02 09:27:21.871 UTC [cauthdsl] func2 -> DEBU adb 0xc00104c7f0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:21.871 UTC [cauthdsl] func1 -> DEBU adc 0xc00104c7f0 gate 1556789241869584500 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU add Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU ade == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.873 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:27:21.877 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:27:21.878 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae8 Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae9 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU aea Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.883 UTC [common.configtx] recurseConfigMap -> DEBU aeb Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 930 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 931 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 933 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.185 UTC [gossip.discovery] learnNewMembers -> DEBU 934 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}"
peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 935 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 936 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 937 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 938 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.188 UTC [gossip.discovery] sendMemResponse -> DEBU 939 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.190 UTC [gossip.comm] Send -> DEBU 93d Entering, sending GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:23.190 UTC [gossip.discovery] sendMemResponse -> DEBU 93e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:23.191 UTC [gossip.comm] sendToEndpoint -> DEBU 93f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.192 UTC [gossip.comm] sendToEndpoint -> DEBU 940 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.234 UTC [comm.grpc.server] 1 -> INFO 941 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.234Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=184.2µs
peer0.org1.example.com | "2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 942 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 943 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:23.238 UTC [gossip.comm] authenticateRemotePeer -> DEBU 944 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:56898"
peer0.org1.example.com | "2019-05-02 09:27:23.239 UTC [gossip.comm] authenticateRemotePeer -> DEBU 945 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56898"
peer0.org1.example.com | "2019-05-02 09:27:23.239 UTC [msp] DeserializeIdentity -> DEBU 946 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.240 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 947 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.240 UTC [msp] DeserializeIdentity -> DEBU 948 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.241 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 949 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.242 UTC [msp] DeserializeIdentity -> DEBU 94a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.242 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 94b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.245 UTC [cauthdsl] func1 -> DEBU 951 0xc00046b810 gate 1556789243245330300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.245 UTC [cauthdsl] func2 -> DEBU 952 0xc00046b810 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 953 0xc00046b810 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 954 0xc00046b810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 955 0xc00046b810 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 956 0xc00046b810 gate 1556789243245330300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 957 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aec Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aed Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aee Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aef Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af0 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af1 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.886 UTC [common.configtx] recurseConfigMap -> DEBU af2 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.887 UTC [common.configtx] recurseConfigMap -> DEBU af3 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af4 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af5 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] NewStandardValues -> DEBU af6 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af7 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af8 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU af9 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afa Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afb Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU afc Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afd Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afe Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU aff Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b00 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU b01 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b02 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] Validate -> DEBU b03 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] validateMSP -> DEBU b04 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] newBccspMsp -> DEBU b05 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] New -> DEBU b06 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] Setup -> DEBU b07 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp.identity] newIdentity -> DEBU b08 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.892 UTC [msp.identity] newIdentity -> DEBU b09 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0a Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] Validate -> DEBU b0b MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] getCertificationChain -> DEBU b0c MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [msp] hasOURole -> DEBU b0d MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [msp] getCertificationChain -> DEBU b0e MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b0f Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b10 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b11 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b12 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [common.channelconfig] Validate -> DEBU b13 Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [common.channelconfig] validateMSP -> DEBU b14 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] newBccspMsp -> DEBU b15 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 958 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 959 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 95a 0xc0004380d0 gate 1556789243247680500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func2 -> DEBU 95b 0xc0004380d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95c 0xc0004380d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95d 0xc0004380d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95e Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95f Verify: sig = 00000000 30 44 02 20 6c 28 c2 10 7e 10 c4 a0 a0 9f e9 3f |0D. l(..~......?|
peer0.org1.example.com | 00000010 44 d8 cf 24 c8 fd 6a 7e 75 f0 ac 18 76 18 2f 52 |D..$..j~u...v./R|
peer0.org1.example.com | 00000020 6b ca 05 e2 02 20 62 ed 9e 52 e4 f7 97 c1 43 a1 |k.... b..R....C.|
peer0.org1.example.com | 00000030 30 41 52 28 85 e8 dc da c4 71 90 1f c8 e3 db 58 |0AR(.....q.....X|
peer0.org1.example.com | 00000040 4e d6 fe 85 06 de |N.....|"
peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [cauthdsl] func2 -> DEBU 960 0xc0004380d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [cauthdsl] func1 -> DEBU 961 0xc0004380d0 gate 1556789243247680500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [policies] Evaluate -> DEBU 962 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 963 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 964 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [gossip.comm] authenticateRemotePeer -> DEBU 966 Authenticated 172.18.0.5:56898"
peer0.org1.example.com | "2019-05-02 09:27:23.251 UTC [gossip.comm] GossipStream -> DEBU 967 Servicing 172.18.0.5:56898"
peer0.org1.example.com | "2019-05-02 09:27:23.251 UTC [gossip.comm] serviceConnection -> DEBU 968 Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] func2 -> DEBU 969 Client 172.18.0.5:56896 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [comm.grpc.server] 1 -> INFO 96a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9432ms
peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] serviceConnection -> DEBU 96c Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [gossip.comm] func2 -> DEBU 96d Client 172.18.0.5:56898 disconnected"
peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [comm.grpc.server] 1 -> INFO 96e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.236Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.8045ms
peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [gossip.comm] readFromStream -> DEBU 96f 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] writeToStream -> DEBU 96b Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:23.254 UTC [gossip.comm] writeToStream -> DEBU 970 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:27:23.254 UTC [gossip.comm] readFromStream -> DEBU 971 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 972 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 973 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 974 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 975 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 976 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 977 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [msp] DeserializeIdentity -> DEBU 978 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] New -> DEBU b16 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] Setup -> DEBU b17 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp.identity] newIdentity -> DEBU b18 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp.identity] newIdentity -> DEBU b19 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b1a Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] Validate -> DEBU b1b MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] getCertificationChain -> DEBU b1c MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [msp] hasOURole -> DEBU b1d MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [msp] getCertificationChain -> DEBU b1e MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b1f Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b20 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b21 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b22 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b23 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b24 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b25 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b26 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b27 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] NewStandardValues -> DEBU b28 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b29 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] validateMSP -> DEBU b2a Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] newBccspMsp -> DEBU b2b Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] New -> DEBU b2c Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] Setup -> DEBU b2d Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp.identity] newIdentity -> DEBU b2e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp.identity] newIdentity -> DEBU b2f Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Validate -> DEBU b30 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b31 Setting up the MSP manager (3 msps)"
orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b32 MSP manager setup complete, setup 3 msps"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b33 Proposed new policy Writers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 979 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func1 -> DEBU 97f 0xc0003ce500 gate 1556789243857472100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 980 0xc0003ce500 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 981 0xc0003ce500 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 982 0xc0003ce500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 983 0xc0003ce500 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func1 -> DEBU 984 0xc0003ce500 gate 1556789243857472100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 985 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 986 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func1 -> DEBU 988 0xc0003ced40 gate 1556789243859073700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 989 0xc0003ced40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98a 0xc0003ced40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98b 0xc0003ced40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98c Verify: digest = 00000000 8a 79 7c 8e a1 c8 89 ff a0 4b 14 35 bc 6c 14 0f |.y|......K.5.l..|
peer0.org1.example.com | 00000010 49 fb 7a 9e 00 8d 11 dc 98 96 4e 83 ca 3a 6e 9b |I.z.......N..:n.|"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98d Verify: sig = 00000000 30 44 02 20 78 01 c2 18 17 34 61 86 50 7a 0a 67 |0D. x....4a.Pz.g|
peer0.org1.example.com | 00000010 7c 4b 3d 16 bf 38 d3 96 de 88 b4 48 1d f5 45 a0 ||K=..8.....H..E.|
peer0.org1.example.com | 00000020 d3 b7 6c 84 02 20 22 89 26 af b8 91 6a 54 ed 8f |..l.. ".&...jT..|
peer0.org1.example.com | 00000030 23 a7 a0 af 9c 2e 72 ba 43 e0 4d 9b c5 7c da 67 |#.....r.C.M..|.g|
peer0.org1.example.com | 00000040 1f f8 a9 d1 e6 5a |.....Z|"
peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98e 0xc0003ced40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [cauthdsl] func1 -> DEBU 98f 0xc0003ced40 gate 1556789243859073700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 990 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 992 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 993 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 994 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 995 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 996 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 997 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 998 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 999 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 99a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.864 UTC [msp] DeserializeIdentity -> DEBU 99c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.869 UTC [msp] DeserializeIdentity -> DEBU 99f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [gossip.comm] Send -> DEBU 9a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a3 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b34 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b35 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b36 Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b37 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b38 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b39 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3a Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3b Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3c Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3d Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3e Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3f Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b40 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b41 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b42 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b43 Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b44 Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b45 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b46 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b47 Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b48 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b49 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4b Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4c Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Value] /Channel/Orderer/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] Send -> DEBU 9a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] sendToEndpoint -> DEBU 9a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] createConnection -> DEBU 9a7 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a8 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a9 scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] UpdateState -> DEBU 9aa ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] switchBalancer -> DEBU 9ab ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] HandleSubConnStateChange -> DEBU 9ac pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ae Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.884 UTC [grpc] HandleSubConnStateChange -> DEBU 9af pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, READY"
peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b2 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b3 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b6 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6b Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6c Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6d Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6e Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b78 As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b79 As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7a Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7b Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7c Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7d Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7e Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7f Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b80 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b81 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b82 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b83 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b84 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b85 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b86 Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b87 Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b88 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.capabilities] Supported -> DEBU b89 Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [common.capabilities] Supported -> DEBU b8a Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] func1 -> DEBU b8b Executing callback to update root CAs"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8c updating root CAs for channel [businesschannel]"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8d adding orderer root CAs for MSP [OrdererMSP]"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8e adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8f adding app root CAs for MSP [Org2MSP]"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b90 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2"
orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b91 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b92 Sign: plaintext: 0A020802120B0A090A03010203100418...5682C079B401AF95A9AC4327AD694339 "
orderer0.example.com | "2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b93 Sign: digest: 69665648D66422A078E26752B27D981A4623B89C9AED8F569755B04E66FFB50F "
orderer0.example.com | "2019-05-02 09:27:21.911 UTC [fsblkstorage] indexBlock -> DEBU b94 Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets=
orderer0.example.com | txId= locPointer=offset=71, bytesLength=22737
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:21.913 UTC [fsblkstorage] updateCheckpoint -> DEBU b95 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71370], isChainEmpty=[false], lastBlockNumber=[2]"
orderer0.example.com | "2019-05-02 09:27:21.913 UTC [orderer.commmon.multichannel] commitBlock -> DEBU b96 [channel: businesschannel] Wrote block [2]"
orderer0.example.com | "2019-05-02 09:27:21.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b97 Sending msg of 28 bytes to 2 on channel businesschannel took 43.2µs"
orderer0.example.com | "2019-05-02 09:27:21.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b98 Sending msg of 28 bytes to 3 on channel businesschannel took 62.1µs"
orderer0.example.com | "2019-05-02 09:27:21.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU b99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 686.1µs "
orderer0.example.com | "2019-05-02 09:27:21.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 388µs "
orderer0.example.com | "2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ba Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9bb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [cauthdsl] func1 -> DEBU 9bf 0xc0003a4250 gate 1556789243893451600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c0 0xc0003a4250 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c1 0xc0003a4250 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c2 0xc0003a4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c3 0xc0003a4250 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func1 -> DEBU 9c4 0xc0003a4250 gate 1556789243893451600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [policies] Evaluate -> DEBU 9c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9c8 0xc0003a4b10 gate 1556789243895108800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9c9 0xc0003a4b10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ca 0xc0003a4b10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9cb 0xc0003a4b10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cd Verify: sig = 00000000 30 45 02 21 00 e8 c6 fe a6 9b 44 d0 c5 36 c3 f7 |0E.!......D..6..|
peer0.org1.example.com | 00000010 55 da b7 8d 34 d5 ec 51 dd a7 2a b0 00 62 79 0d |U...4..Q..*..by.|
peer0.org1.example.com | 00000020 de 82 36 e8 a1 02 20 51 7b 6a 66 c1 9f 16 b8 cb |..6... Q{jf.....|
peer0.org1.example.com | 00000030 1b 72 78 c6 4d 7e 74 00 7d 9c ec 81 f3 6d 43 d8 |.rx.M~t.}....mC.|
peer0.org1.example.com | 00000040 de cd d2 57 8b b7 18 |...W...|"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ce 0xc0003a4b10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9cf 0xc0003a4b10 gate 1556789243895108800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d2 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d4 Authenticated 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] createConnection -> DEBU 9d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] sendToEndpoint -> DEBU 9d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.065 UTC [msp.identity] Sign -> DEBU 9d7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151010 "
peer0.org1.example.com | "2019-05-02 09:27:24.066 UTC [msp.identity] Sign -> DEBU 9d8 Sign: digest: D6BF6E0695D3ECF37A1BBAC784B9F14817C6B21C238B9D8ED8EF86DE7BFF3851 "
peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9d9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9da Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [gossip.discovery] periodicalSendAlive -> DEBU 9db Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:24.069 UTC [msp] DeserializeIdentity -> DEBU 9dc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.070 UTC [msp] DeserializeIdentity -> DEBU 9dd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.072 UTC [msp] DeserializeIdentity -> DEBU 9de Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.074 UTC [gossip.comm] Send -> DEBU 9df Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.075 UTC [msp] DeserializeIdentity -> DEBU 9e2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] Send -> DEBU 9e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.093 UTC [gossip.comm] Send -> DEBU 9e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.093 UTC [gossip.comm] sendToEndpoint -> DEBU 9e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.094 UTC [gossip.comm] sendToEndpoint -> DEBU 9e8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.096 UTC [gossip.gossip] handleMessage -> DEBU 9e9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.gossip] handleMessage -> DEBU 9ea Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9eb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ec Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ed Verify: digest = 00000000 d6 bf 6e 06 95 d3 ec f3 7a 1b ba c7 84 b9 f1 48 |..n.....z......H|
peer0.org1.example.com | 00000010 17 c6 b2 1c 23 8b 9d 8e d8 ef 86 de 7b ff 38 51 |....#.......{.8Q|"
peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ee Verify: sig = 00000000 30 45 02 21 00 b3 86 b6 ba 47 97 70 46 a4 5b 1a |0E.!.....G.pF.[.|
peer0.org1.example.com | 00000010 c6 08 d9 cd a1 da 36 6a a4 eb c3 7a 11 80 08 a4 |......6j...z....|
peer0.org1.example.com | 00000020 3c 5c f8 b4 f6 02 20 12 1f df 46 28 bd b8 31 fa |<\.... ...F(..1.|
peer0.org1.example.com | 00000030 97 6e 51 bc 0b 41 91 9e 3e 95 b9 a5 52 17 36 67 |.nQ..A..>...R.6g|
peer0.org1.example.com | 00000040 4b 6c a9 1f 1c ec 5c |Kl....\|"
orderer0.example.com | "2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9e Sending msg of 28 bytes to 3 on channel testchainid took 35µs"
orderer0.example.com | "2019-05-02 09:27:22.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 977.7µs "
orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba0 Sending msg of 28 bytes to 2 on channel businesschannel took 35.6µs"
orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba1 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs"
orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs "
orderer0.example.com | "2019-05-02 09:27:22.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.2µs "
orderer0.example.com | "2019-05-02 09:27:22.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba7 Sending msg of 28 bytes to 3 on channel testchainid took 128.1µs"
orderer0.example.com | "2019-05-02 09:27:22.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.9µs "
orderer0.example.com | "2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs"
orderer0.example.com | "2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU baa Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs"
orderer0.example.com | "2019-05-02 09:27:22.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs "
orderer0.example.com | "2019-05-02 09:27:22.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU bac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs "
orderer0.example.com | "2019-05-02 09:27:22.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU bad Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:22.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU bae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.055 UTC [orderer.common.server] Deliver -> DEBU baf Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb0 Starting new deliver loop for 172.18.0.5:42818"
orderer0.example.com | "2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb1 Attempting to read seek info message from 172.18.0.5:42818"
orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:23.057 UTC [policies] Evaluate -> DEBU bb6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:23.057 UTC [msp] DeserializeIdentity -> DEBU bb7 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:23.058 UTC [msp.identity] newIdentity -> DEBU bb8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy
orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c
orderer0.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv
orderer0.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
orderer0.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr
orderer0.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:23.058 UTC [cauthdsl] func1 -> DEBU bb9 0xc001159a70 gate 1556789243058667500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bba 0xc001159a70 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbb 0xc001159a70 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbc 0xc001159a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
orderer0.example.com | "2019-05-02 09:27:23.061 UTC [cauthdsl] func2 -> DEBU bbd 0xc001159a70 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:23.061 UTC [cauthdsl] func1 -> DEBU bbe 0xc001159a70 gate 1556789243058667500 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:23.061 UTC [policies] Evaluate -> DEBU bbf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:23.063 UTC [cauthdsl] func1 -> DEBU bc2 0xc00118ec10 gate 1556789243063652700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:23.064 UTC [cauthdsl] func2 -> DEBU bc3 0xc00118ec10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:23.069 UTC [cauthdsl] func2 -> DEBU bc4 0xc00118ec10 processing identity 0 with bytes of efef60"
peer0.org1.example.com | "2019-05-02 09:27:24.098 UTC [gossip.discovery] isSentByMe -> DEBU 9ef Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9f4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f5 Verify: digest = 00000000 19 34 b5 65 b4 96 3c c4 b7 33 51 9b 88 09 01 ad |.4.e..<..3Q.....|
peer0.org1.example.com | 00000010 81 36 7a 4c e6 01 ae 0a fc 19 6f c2 62 b7 94 84 |.6zL......o.b...|"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f6 Verify: sig = 00000000 30 45 02 21 00 a0 ce 24 96 83 db ae 98 4c d4 99 |0E.!...$.....L..|
peer0.org1.example.com | 00000010 4f eb f2 2b 58 5c a0 51 5c b5 1c 50 63 ba a6 3c |O..+X\.Q\..Pc..<|
peer0.org1.example.com | 00000020 cc ea e6 6a a3 02 20 30 d0 04 1b 14 43 8a 95 3a |...j.. 0....C..:|
peer0.org1.example.com | 00000030 0d 1a 02 b7 1a 4f 16 cf c9 74 af f1 98 a4 8a ba |.....O...t......|
peer0.org1.example.com | 00000040 a0 99 f6 5e 28 4f f0 |...^(O.|"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f8 Verify: sig = 00000000 30 45 02 21 00 d8 bf c3 11 5e bf 60 92 2d 9c e6 |0E.!.....^.`.-..|
peer0.org1.example.com | 00000010 b7 e1 ef fe 6a 49 5d 48 3f d5 8b c5 d9 ed d0 b1 |....jI]H?.......|
peer0.org1.example.com | 00000020 8d 1e 92 36 ef 02 20 66 b7 9a 8e fd 5e 8d a9 fb |...6.. f....^...|
peer0.org1.example.com | 00000030 17 2f 1d 7c d5 89 4e f6 9c 42 10 c9 50 1b e5 08 |./.|..N..B..P...|
peer0.org1.example.com | 00000040 f9 1e c3 fd a5 78 11 |.....x.|"
peer0.org1.example.com | "2019-05-02 09:27:24.127 UTC [gossip.gossip] handleMessage -> DEBU 9f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 9fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fc updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fd Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fe Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:24.133 UTC [gossip.discovery] learnExistingMembers -> DEBU 9ff Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.133 UTC [gossip.discovery] handleAliveMessage -> DEBU a00 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU a01 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.gossip] handleMessage -> DEBU a02 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a04 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a05 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a06 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a07 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [gossip.comm] Send -> DEBU a08 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a09 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] Send -> DEBU a0a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
orderer0.example.com | "2019-05-02 09:27:23.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bc5 Checking if identity satisfies MEMBER role for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:23.070 UTC [msp] Validate -> DEBU bc6 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:23.071 UTC [msp] getCertificationChain -> DEBU bc7 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:23.072 UTC [cauthdsl] func2 -> DEBU bc8 0xc00118ec10 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bc9 Verify: digest = 00000000 38 a0 81 24 8f 33 ab 73 3d 14 8c ac 62 ab 1a 32 |8..$.3.s=...b..2|
orderer0.example.com | 00000010 27 4d a0 4b c7 b6 15 68 3a d1 42 b8 e9 5d 33 fe |'M.K...h:.B..]3.|"
orderer0.example.com | "2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bca Verify: sig = 00000000 30 45 02 21 00 94 7f d4 b1 c0 40 9d 9c b3 db 14 |0E.!......@.....|
orderer0.example.com | 00000010 d1 39 25 3c 44 80 e6 de dc d0 a6 46 60 63 67 58 |.9%<D......F`cgX|
orderer0.example.com | 00000020 2b 75 86 14 a5 02 20 35 da c6 78 81 63 ab 11 92 |+u.... 5..x.c...|
orderer0.example.com | 00000030 1f d7 db 75 28 52 ae b5 8f dc 03 43 98 72 1d fb |...u(R.....C.r..|
orderer0.example.com | 00000040 16 25 44 af 83 6a f8 |.%D..j.|"
orderer0.example.com | "2019-05-02 09:27:23.074 UTC [cauthdsl] func2 -> DEBU bcb 0xc00118ec10 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:23.079 UTC [cauthdsl] func1 -> DEBU bcc 0xc00118ec10 gate 1556789243063652700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bcd Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bcf Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd1 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:23.081 UTC [common.deliver] deliverBlocks -> DEBU bd3 [channel: businesschannel] Received seekInfo (0xc0010cfe40) start:<specified:<number:1 > > stop:<specified:<number:18446744073709551615 > > from 172.18.0.5:42818"
orderer0.example.com | "2019-05-02 09:27:23.081 UTC [fsblkstorage] Next -> DEBU bd4 Initializing block stream for iterator. itr.maxBlockNumAvailable=2"
orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] newBlockfileStream -> DEBU bd5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]"
orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd6 Remaining bytes=[47432], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd7 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}"
orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd8 blockbytes [23684] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:23.083 UTC [common.deliver] deliverBlocks -> DEBU bd9 [channel: businesschannel] Delivering block [1] for (0xc0010cfe40) for 172.18.0.5:42818"
orderer0.example.com | "2019-05-02 09:27:23.094 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bda Remaining bytes=[23745], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdb Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}"
orderer0.example.com | "2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdc blockbytes [23742] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:23.095 UTC [common.deliver] deliverBlocks -> DEBU bdd [channel: businesschannel] Delivering block [2] for (0xc0010cfe40) for 172.18.0.5:42818"
orderer0.example.com | "2019-05-02 09:27:23.096 UTC [fsblkstorage] waitForBlock -> DEBU bde Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]"
orderer0.example.com | "2019-05-02 09:27:23.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs"
orderer0.example.com | "2019-05-02 09:27:23.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.5µs "
orderer0.example.com | "2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be2 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs"
orderer0.example.com | "2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be3 Sending msg of 28 bytes to 3 on channel businesschannel took 27.2µs"
orderer0.example.com | "2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.1µs "
orderer0.example.com | "2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.1µs "
orderer0.example.com | "2019-05-02 09:27:23.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU be6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU be7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU be8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.719 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be9 Sending msg of 28 bytes to 3 on channel testchainid took 152.4µs"
orderer0.example.com | "2019-05-02 09:27:23.720 UTC [orderer.common.cluster.step] sendMessage -> DEBU bea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.4µs "
orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU beb Sending msg of 28 bytes to 2 on channel businesschannel took 65.3µs"
orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bec Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs"
peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a0f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a10 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU a11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a12 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [msp] DeserializeIdentity -> DEBU a13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a15 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a16 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1a 0xc0020a2400 gate 1556789244193759600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1b 0xc0020a2400 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1c 0xc0020a2400 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1d 0xc0020a2400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1e 0xc0020a2400 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1f 0xc0020a2400 gate 1556789244193759600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a23 0xc0020a2c40 gate 1556789244194121800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a24 0xc0020a2c40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a25 0xc0020a2c40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a26 0xc0020a2c40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a27 Verify: digest = 00000000 21 7c a4 01 64 7f ac 24 67 d5 7f 09 18 6e 42 62 |!|..d..$g....nBb|
peer0.org1.example.com | 00000010 91 de 4f 39 92 30 18 8e 97 8a ed 79 34 b7 ee 58 |..O9.0.....y4..X|"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a28 Verify: sig = 00000000 30 45 02 21 00 fb 9f f0 d2 14 3e 21 69 d6 a1 2f |0E.!......>!i../|
peer0.org1.example.com | 00000010 f8 05 3e 45 15 f0 33 af d8 54 96 31 a2 73 8f cb |..>E..3..T.1.s..|
peer0.org1.example.com | 00000020 5f d1 ae 8f ac 02 20 6f 37 67 40 2a b8 e3 d4 7c |_..... o7g@*...||
peer0.org1.example.com | 00000030 c0 70 2a a6 99 df 60 61 17 19 d9 3f bd fd 39 03 |.p*...`a...?..9.|
peer0.org1.example.com | 00000040 1c 59 97 54 d3 a1 47 |.Y.T..G|"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a29 0xc0020a2c40 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs "
orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.2µs "
orderer0.example.com | "2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bef Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf2 Sending msg of 28 bytes to 3 on channel testchainid took 15µs"
orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs "
orderer0.example.com | "2019-05-02 09:27:24.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs"
orderer0.example.com | "2019-05-02 09:27:24.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs"
orderer0.example.com | "2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.9µs "
orderer0.example.com | "2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs "
orderer0.example.com | "2019-05-02 09:27:24.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU bfa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfb Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs"
orderer0.example.com | "2019-05-02 09:27:24.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.2µs "
orderer0.example.com | "2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfd Sending msg of 28 bytes to 2 on channel businesschannel took 25µs"
orderer0.example.com | "2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfe Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs"
orderer0.example.com | "2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs "
orderer0.example.com | "2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.4µs "
orderer0.example.com | "2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c01 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c02 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU c03 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c04 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs"
orderer0.example.com | "2019-05-02 09:27:25.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs "
orderer0.example.com | "2019-05-02 09:27:25.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c06 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs"
orderer0.example.com | "2019-05-02 09:27:25.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c08 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs"
orderer0.example.com | "2019-05-02 09:27:25.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.5µs "
orderer0.example.com | "2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU c09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2669ms "
orderer0.example.com | "2019-05-02 09:27:25.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0d Sending msg of 28 bytes to 3 on channel testchainid took 43.9µs"
orderer0.example.com | "2019-05-02 09:27:25.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs "
orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0f Sending msg of 28 bytes to 2 on channel businesschannel took 111.8µs"
orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c10 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs"
orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU c11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs "
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a2a 0xc0020a2c40 gate 1556789244194121800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] handleAliveMessage -> DEBU a2f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a30 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a31 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 "
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a32 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 "
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a33 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a34 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.195 UTC [gossip.discovery] handleAliveMessage -> DEBU a35 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU a36 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a37 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a39 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.210 UTC [msp] DeserializeIdentity -> DEBU a3a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [gossip.comm] Send -> DEBU a3d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [msp] DeserializeIdentity -> DEBU a3f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] Send -> DEBU a40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a41 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a42 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a44 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.214 UTC [gossip.gossip] handleMessage -> DEBU a45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.gossip] handleMessage -> DEBU a46 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.219 UTC [gossip.comm] func1 -> DEBU a48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.219 UTC [gossip.gossip] handleMessage -> DEBU a49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4a Exiting"
orderer0.example.com | "2019-05-02 09:27:25.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs "
orderer0.example.com | "2019-05-02 09:27:25.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:25.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c15 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c16 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs"
orderer0.example.com | "2019-05-02 09:27:26.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs "
orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c18 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs"
orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c19 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs"
orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.6µs "
orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.6µs "
orderer0.example.com | "2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c1f Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs"
orderer0.example.com | "2019-05-02 09:27:26.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs "
orderer0.example.com | "2019-05-02 09:27:26.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c21 Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs"
orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c22 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs"
orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.5µs "
orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.5µs "
orderer0.example.com | "2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:27.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:27.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c28 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs"
orderer0.example.com | "2019-05-02 09:27:27.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.4µs "
orderer0.example.com | "2019-05-02 09:27:27.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 2 on channel businesschannel took 89.5µs"
orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2b Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs"
orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.2µs "
orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 567µs "
orderer0.example.com | "2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:27.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c30 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:27.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c31 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs"
orderer0.example.com | "2019-05-02 09:27:27.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1744ms "
orderer0.example.com | "2019-05-02 09:27:27.825 UTC [grpc] infof -> DEBU c33 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:27.825 UTC [common.deliver] deliverBlocks -> DEBU c34 Context canceled, aborting wait for next block"
orderer0.example.com | "2019-05-02 09:27:27.826 UTC [orderer.common.server] func1 -> DEBU c35 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:27.826 UTC [comm.grpc.server] 1 -> INFO c36 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:42818 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7707471s
peer0.org1.example.com | "2019-05-02 09:27:24.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.222 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.222 UTC [gossip.gossip] handleMessage -> DEBU a4d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] Send -> DEBU a50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a52 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a54 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a55 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a56 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a57 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a58 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [gossip.comm] Send -> DEBU a59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a61 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.gossip] handleMessage -> DEBU a62 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a63 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a64 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a67 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a68 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [cauthdsl] func1 -> DEBU a6c 0xc0020c2240 gate 1556789244298951400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.300 UTC [cauthdsl] func2 -> DEBU a6d 0xc0020c2240 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6e 0xc0020c2240 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6f 0xc0020c2240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a70 0xc0020c2240 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func1 -> DEBU a71 0xc0020c2240 gate 1556789244298951400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func1 -> DEBU a75 0xc002152500 gate 1556789244302086000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a76 0xc002152500 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a77 0xc002152500 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a78 0xc002152500 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a79 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a7a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [cauthdsl] func2 -> DEBU a7b 0xc002152500 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [cauthdsl] func1 -> DEBU a7c 0xc002152500 gate 1556789244302086000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [gossip.comm] func1 -> DEBU a7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.304 UTC [policies] Evaluate -> DEBU a81 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [policies] Evaluate -> DEBU a82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.304 UTC [gossip.pull] Hello -> DEBU a80 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [msp] DeserializeIdentity -> DEBU a83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a85 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a86 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [cauthdsl] func1 -> DEBU a8a 0xc0021535e0 gate 1556789244309579200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [gossip.comm] Send -> DEBU a84 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15805491442320967247 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [cauthdsl] func2 -> DEBU a8b 0xc0021535e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.310 UTC [cauthdsl] func2 -> DEBU a8d 0xc0021535e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8e 0xc0021535e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [gossip.comm] sendToEndpoint -> DEBU a8c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15805491442320967247 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8f 0xc0021535e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.312 UTC [cauthdsl] func1 -> DEBU a91 0xc0021535e0 gate 1556789244309579200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [gossip.comm] sendToEndpoint -> DEBU a90 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.313 UTC [policies] Evaluate -> DEBU a92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.314 UTC [policies] Evaluate -> DEBU a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.315 UTC [policies] Evaluate -> DEBU a94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.316 UTC [cauthdsl] func1 -> DEBU a95 0xc0020c2bb0 gate 1556789244316374500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.316 UTC [cauthdsl] func2 -> DEBU a96 0xc0020c2bb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a97 0xc0020c2bb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a98 0xc0020c2bb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [msp.identity] Verify -> DEBU a99 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:24.318 UTC [msp.identity] Verify -> DEBU a9a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:24.320 UTC [cauthdsl] func2 -> DEBU a9b 0xc0020c2bb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.320 UTC [cauthdsl] func1 -> DEBU a9c 0xc0020c2bb0 gate 1556789244316374500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [policies] Evaluate -> DEBU aa0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.323 UTC [msp.identity] Verify -> DEBU aa3 Verify: digest = 00000000 fa 73 4a 64 d2 0b 4a dc 12 d7 d6 81 12 db 4c e8 |.sJd..J.......L.|
peer0.org1.example.com | 00000010 d3 bf b6 e4 81 c6 5d 68 68 55 fe eb a9 b3 27 d3 |......]hhU....'.|"
peer0.org1.example.com | "2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa4 Verify: sig = 00000000 30 45 02 21 00 ff dc b6 59 78 ea e1 49 ee a6 88 |0E.!....Yx..I...|
peer0.org1.example.com | 00000010 0e 33 c7 06 51 f4 b4 84 39 aa 2a 91 66 5f f3 b6 |.3..Q...9.*.f_..|
peer0.org1.example.com | 00000020 90 35 28 c5 07 02 20 26 56 78 3e 99 16 97 0f 46 |.5(... &Vx>....F|
peer0.org1.example.com | 00000030 5a 97 9c 37 07 27 e2 0d 94 24 33 3b fe 00 ad 48 |Z..7.'...$3;...H|
peer0.org1.example.com | 00000040 0b 52 3b 94 1c c8 d7 |.R;....|"
peer0.org1.example.com | "2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:24.325 UTC [msp.identity] Verify -> DEBU aa6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU aa7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU aa8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.330 UTC [policies] Evaluate -> DEBU aa9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aaa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [msp] DeserializeIdentity -> DEBU aac Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.332 UTC [msp.identity] newIdentity -> DEBU aad Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func1 -> DEBU aae 0xc002164ef0 gate 1556789244333225600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU aaf 0xc002164ef0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU ab0 0xc002164ef0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ab1 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] Validate -> DEBU ab2 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] getCertificationChain -> DEBU ab3 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:24.335 UTC [cauthdsl] func2 -> DEBU ab4 0xc002164ef0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.335 UTC [msp.identity] Verify -> DEBU ab5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
orderer0.example.com | "2019-05-02 09:27:27.826 UTC [fsblkstorage] waitForBlock -> DEBU c37 Came out of wait. maxAvailaBlockNumber=[2]"
orderer0.example.com | "2019-05-02 09:27:27.920 UTC [orderer.common.server] Broadcast -> DEBU c38 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:27.920 UTC [orderer.common.broadcast] Handle -> DEBU c39 Starting new broadcast loop for 172.18.0.8:57248"
orderer0.example.com | "2019-05-02 09:27:27.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c3a [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57248 with txid 'fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:27.956 UTC [policies] Evaluate -> DEBU c3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:27.958 UTC [policies] Evaluate -> DEBU c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:27.958 UTC [msp] DeserializeIdentity -> DEBU c40 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:27.959 UTC [msp.identity] newIdentity -> DEBU c41 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | "2019-05-02 09:27:24.336 UTC [msp.identity] Verify -> DEBU ab6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:24.336 UTC [cauthdsl] func2 -> DEBU ab7 0xc002164ef0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [cauthdsl] func1 -> DEBU ab8 0xc002164ef0 gate 1556789244333225600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU ab9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU abb Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.338 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.338 UTC [gossip.gossip] handleMessage -> DEBU abd Exiting"
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:27.960 UTC [cauthdsl] func1 -> DEBU c42 0xc0008a61a0 gate 1556789247960911800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c43 0xc0008a61a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c44 0xc0008a61a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:27.962 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c45 Checking if identity satisfies MEMBER role for Org1MSP"
orderer0.example.com | "2019-05-02 09:27:27.963 UTC [msp] Validate -> DEBU c46 MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:27.963 UTC [msp] getCertificationChain -> DEBU c47 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:27.964 UTC [cauthdsl] func2 -> DEBU c48 0xc0008a61a0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c49 Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=|
orderer0.example.com | 00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|"
orderer0.example.com | "2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c4a Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....|
orderer0.example.com | 00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n|
orderer0.example.com | 00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^|
orderer0.example.com | 00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..|
orderer0.example.com | 00000040 fa b9 0d de c0 80 62 |......b|"
orderer0.example.com | "2019-05-02 09:27:27.966 UTC [cauthdsl] func2 -> DEBU c4b 0xc0008a61a0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:27.966 UTC [cauthdsl] func1 -> DEBU c4c 0xc0008a61a0 gate 1556789247960911800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:27.967 UTC [policies] Evaluate -> DEBU c4d Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4f Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c51 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:27.970 UTC [orderer.common.blockcutter] Ordered -> DEBU c53 Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:27.970 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c54 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57248"
orderer0.example.com | "2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c55 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs"
orderer0.example.com | "2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c56 Sending msg of 28 bytes to 3 on channel businesschannel took 173.3µs"
orderer0.example.com | "2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.7µs "
orderer0.example.com | "2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 161.9µs "
orderer0.example.com | "2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c59 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs"
orderer0.example.com | "2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5a Sending msg of 28 bytes to 3 on channel businesschannel took 171.9µs"
orderer0.example.com | "2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.8µs "
orderer0.example.com | "2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs "
orderer0.example.com | "2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:24.339 UTC [gossip.gossip] handleMessage -> DEBU abe Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.339 UTC [msp] DeserializeIdentity -> DEBU abf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.340 UTC [msp] DeserializeIdentity -> DEBU ac0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.341 UTC [msp] DeserializeIdentity -> DEBU ac1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.341 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.343 UTC [policies] Evaluate -> DEBU ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.345 UTC [cauthdsl] func1 -> DEBU ac8 0xc002177c60 gate 1556789244345261300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.345 UTC [cauthdsl] func2 -> DEBU ac9 0xc002177c60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU aca 0xc002177c60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU acb 0xc002177c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [cauthdsl] func2 -> DEBU acc 0xc002177c60 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [cauthdsl] func1 -> DEBU acd 0xc002177c60 gate 1556789244345261300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [policies] Evaluate -> DEBU ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [cauthdsl] func1 -> DEBU ad1 0xc00218a4f0 gate 1556789244348793700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.350 UTC [cauthdsl] func2 -> DEBU ad2 0xc00218a4f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad3 0xc00218a4f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad4 0xc00218a4f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [msp.identity] Verify -> DEBU ad5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:24.352 UTC [msp.identity] Verify -> DEBU ad6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:24.352 UTC [cauthdsl] func2 -> DEBU ad7 0xc00218a4f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [cauthdsl] func1 -> DEBU ad8 0xc00218a4f0 gate 1556789244348793700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU adb Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [policies] Evaluate -> DEBU adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [msp] DeserializeIdentity -> DEBU add Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ade Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU adf Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [policies] Evaluate -> DEBU ae2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func1 -> DEBU ae3 0xc00218b5d0 gate 1556789244356351400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae4 0xc00218b5d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae5 0xc00218b5d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae6 0xc00218b5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae7 0xc00218b5d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [cauthdsl] func1 -> DEBU ae8 0xc00218b5d0 gate 1556789244356351400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU ae9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aeb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func1 -> DEBU aec 0xc00218be70 gate 1556789244359183700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aed 0xc00218be70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aee 0xc00218be70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU aef 0xc00218be70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af0 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af1 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU af2 0xc00218be70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func1 -> DEBU af3 0xc00218be70 gate 1556789244359183700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.pull] HandleMessage -> DEBU afa GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU afb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.540 UTC [gossip.gossip] handleMessage -> DEBU afc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU aff Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU b00 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3402603607982281412 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.543 UTC [gossip.pull] HandleMessage -> DEBU b01 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3402603607982281412 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.544 UTC [gossip.pull] SendDigest -> DEBU b02 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:24.544 UTC [gossip.gossip] handleMessage -> DEBU b03 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.550 UTC [gossip.gossip] handleMessage -> DEBU b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.550 UTC [msp.identity] Verify -> DEBU b05 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:24.551 UTC [msp.identity] Verify -> DEBU b06 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:24.551 UTC [gossip.gossip] handleMessage -> DEBU b07 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.561 UTC [gossip.gossip] handleMessage -> DEBU b08 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
orderer0.example.com | "2019-05-02 09:27:28.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c60 Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs"
orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c61 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs"
orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs "
orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs "
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c65 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c66 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c67 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs"
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs "
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c69 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs"
orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs "
orderer0.example.com | "2019-05-02 09:27:28.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:28.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs"
orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs "
orderer0.example.com | "2019-05-02 09:27:29.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c70 Sending msg of 28 bytes to 3 on channel businesschannel took 40.9µs"
orderer0.example.com | "2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.1µs "
orderer0.example.com | "2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs "
orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c73 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs"
orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c75 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c77 Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs"
orderer0.example.com | "2019-05-02 09:27:29.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 244.1µs "
orderer0.example.com | "2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU c79 Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] propose -> INFO c7a Created block [3], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:29.972 UTC [orderer.consensus.etcdraft] 2 -> DEBU c7b Proposed block [3] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:29.976 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7c Sending msg of 3831 bytes to 3 on channel businesschannel took 18.1µs"
orderer0.example.com | "2019-05-02 09:27:29.977 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7d Sending msg of 3831 bytes to 2 on channel businesschannel took 203.1µs"
orderer0.example.com | "2019-05-02 09:27:29.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7e Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer2.example.com(orderer2.example.com:7050) took 190.4µs "
orderer0.example.com | "2019-05-02 09:27:29.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer1.example.com(orderer1.example.com:7050) took 121.5µs "
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c82 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs"
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c83 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs"
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] sendMessage -> DEBU c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs "
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] writeBlock -> INFO c85 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:29.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU c86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.4µs "
peer0.org1.example.com | "2019-05-02 09:27:24.561 UTC [msp.identity] Verify -> DEBU b09 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:24.562 UTC [msp.identity] Verify -> DEBU b0a Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:24.562 UTC [msp] DeserializeIdentity -> DEBU b0b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.562 UTC [gossip.gossip] handleMessage -> DEBU b0c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.788 UTC [gossip.gossip] handleMessage -> DEBU b0d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.790 UTC [msp] DeserializeIdentity -> DEBU b0e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b0f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b10 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.795 UTC [gossip.gossip] handleMessage -> DEBU b11 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.796 UTC [gossip.gossip] handleMessage -> DEBU b12 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.796 UTC [msp] DeserializeIdentity -> DEBU b13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b15 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b16 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.798 UTC [policies] Evaluate -> DEBU b17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.799 UTC [policies] Evaluate -> DEBU b18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.801 UTC [policies] Evaluate -> DEBU b19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.801 UTC [cauthdsl] func1 -> DEBU b1a 0xc002216700 gate 1556789244801894700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.803 UTC [gossip.comm] func1 -> DEBU b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.802 UTC [cauthdsl] func2 -> DEBU b1c 0xc002216700 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1d 0xc002216700 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1e 0xc002216700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.805 UTC [cauthdsl] func2 -> DEBU b1f 0xc002216700 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.805 UTC [cauthdsl] func1 -> DEBU b20 0xc002216700 gate 1556789244801894700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.808 UTC [policies] Evaluate -> DEBU b21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.810 UTC [cauthdsl] func1 -> DEBU b24 0xc002216f40 gate 1556789244810380700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.810 UTC [cauthdsl] func2 -> DEBU b25 0xc002216f40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b26 0xc002216f40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b27 0xc002216f40 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c80 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.984 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c87 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c88 Sign: plaintext: 0A020802120B0A090A03010203100418...F97EED81623BCA86C8D9743A6BD37848 "
orderer0.example.com | "2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c89 Sign: digest: 3A61CB55F205B840086B7312602C27B1721649382796FD94F5CA81888B1EDCF3 "
orderer0.example.com | "2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8c Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs"
orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8d Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs"
orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.6µs "
orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.4µs "
orderer0.example.com | "2019-05-02 09:27:29.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c90 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:29.991 UTC [fsblkstorage] indexBlock -> DEBU c92 Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets=
orderer0.example.com | txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:29.999 UTC [fsblkstorage] updateCheckpoint -> DEBU c93 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76081], isChainEmpty=[false], lastBlockNumber=[3]"
orderer0.example.com | "2019-05-02 09:27:30.001 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c94 [channel: businesschannel] Wrote block [3]"
orderer0.example.com | "2019-05-02 09:27:30.053 UTC [grpc] infof -> DEBU c95 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:30.053 UTC [orderer.common.broadcast] Handle -> WARN c96 Error reading from 172.18.0.8:57248: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:30.055 UTC [orderer.common.server] func1 -> DEBU c97 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:30.056 UTC [comm.grpc.server] 1 -> INFO c98 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57248 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.137027s
orderer0.example.com | "2019-05-02 09:27:30.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c99 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:30.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs "
orderer0.example.com | "2019-05-02 09:27:30.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 28 bytes to 3 on channel testchainid took 38.2µs"
orderer0.example.com | "2019-05-02 09:27:30.452 UTC [orderer.common.server] Broadcast -> DEBU c9c Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:30.452 UTC [orderer.common.broadcast] Handle -> DEBU c9d Starting new broadcast loop for 172.18.0.8:57260"
orderer0.example.com | "2019-05-02 09:27:30.462 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c9e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57260 with txid 'fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:30.463 UTC [policies] Evaluate -> DEBU c9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:30.465 UTC [policies] Evaluate -> DEBU ca3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:30.465 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:30.466 UTC [msp.identity] newIdentity -> DEBU ca5 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:30.467 UTC [cauthdsl] func1 -> DEBU ca6 0xc00026d9b0 gate 1556789250467801700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca7 0xc00026d9b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca8 0xc00026d9b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU ca9 0xc00026d9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU caa 0xc00026d9b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func1 -> DEBU cab 0xc00026d9b0 gate 1556789250467801700 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:30.470 UTC [policies] Evaluate -> DEBU cac Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [msp.identity] Verify -> DEBU b28 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:24.812 UTC [msp.identity] Verify -> DEBU b29 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:24.812 UTC [cauthdsl] func2 -> DEBU b2a 0xc002216f40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [cauthdsl] func1 -> DEBU b2b 0xc002216f40 gate 1556789244810380700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [policies] Evaluate -> DEBU b2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [msp] DeserializeIdentity -> DEBU b30 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [gossip.gossip] handleMessage -> DEBU b31 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.815 UTC [gossip.gossip] handleMessage -> DEBU b32 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.815 UTC [msp] DeserializeIdentity -> DEBU b33 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b35 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b36 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [cauthdsl] func1 -> DEBU b3a 0xc002238bb0 gate 1556789244817836900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3b 0xc002238bb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3c 0xc002238bb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3d 0xc002238bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [cauthdsl] func2 -> DEBU b3e 0xc002238bb0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [cauthdsl] func1 -> DEBU b3f 0xc002238bb0 gate 1556789244817836900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [policies] Evaluate -> DEBU b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func1 -> DEBU b43 0xc002239400 gate 1556789244820399100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b44 0xc002239400 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b45 0xc002239400 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.821 UTC [cauthdsl] func2 -> DEBU b46 0xc002239400 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.821 UTC [msp.identity] Verify -> DEBU b47 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:24.822 UTC [msp.identity] Verify -> DEBU b48 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
orderer0.example.com | "2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:30.471 UTC [cauthdsl] func1 -> DEBU caf 0xc000280da0 gate 1556789250471780600 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb0 0xc000280da0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb1 0xc000280da0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:30.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cb2 Checking if identity satisfies MEMBER role for Org2MSP"
orderer0.example.com | "2019-05-02 09:27:30.473 UTC [msp] Validate -> DEBU cb3 MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:27:30.474 UTC [msp] getCertificationChain -> DEBU cb4 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:27:30.474 UTC [cauthdsl] func2 -> DEBU cb5 0xc000280da0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb6 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...|
orderer0.example.com | 00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|"
orderer0.example.com | "2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb7 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T|
orderer0.example.com | 00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....|
orderer0.example.com | 00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. |
orderer0.example.com | 00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.|
orderer0.example.com | 00000040 91 85 a0 fa 29 4d |....)M|"
orderer0.example.com | "2019-05-02 09:27:30.476 UTC [cauthdsl] func2 -> DEBU cb8 0xc000280da0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:30.477 UTC [cauthdsl] func1 -> DEBU cb9 0xc000280da0 gate 1556789250471780600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cba Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cbb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:30.479 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:30.479 UTC [orderer.common.blockcutter] Ordered -> DEBU cc0 Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:30.479 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cc1 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57260"
orderer0.example.com | "2019-05-02 09:27:30.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc2 Sending msg of 28 bytes to 2 on channel businesschannel took 92.8µs"
orderer0.example.com | "2019-05-02 09:27:30.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 83.4µs"
orderer0.example.com | "2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.8µs "
orderer0.example.com | "2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.7µs "
orderer0.example.com | "2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:30.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:30.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc9 Sending msg of 28 bytes to 3 on channel testchainid took 28.4µs"
orderer0.example.com | "2019-05-02 09:27:30.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU cca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.3µs "
orderer0.example.com | "2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs"
orderer0.example.com | "2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs"
orderer0.example.com | "2019-05-02 09:27:30.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172µs "
orderer0.example.com | "2019-05-02 09:27:30.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6002ms "
orderer0.example.com | "2019-05-02 09:27:30.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:30.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd2 Sending msg of 28 bytes to 3 on channel testchainid took 55.9µs"
orderer0.example.com | "2019-05-02 09:27:31.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs "
orderer0.example.com | "2019-05-02 09:27:31.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd4 Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs"
orderer0.example.com | "2019-05-02 09:27:31.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel businesschannel took 31.6µs"
orderer0.example.com | "2019-05-02 09:27:31.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 213.9µs "
orderer0.example.com | "2019-05-02 09:27:31.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5292ms "
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:24.822 UTC [cauthdsl] func2 -> DEBU b49 0xc002239400 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [cauthdsl] func1 -> DEBU b4a 0xc002239400 gate 1556789244820399100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.825 UTC [msp] DeserializeIdentity -> DEBU b4f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.825 UTC [gossip.gossip] handleMessage -> DEBU b50 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.830 UTC [gossip.comm] func1 -> DEBU b51 Got message: GossipMessage: tag:EMPTY hello:<nonce:12496793612494837772 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.831 UTC [gossip.gossip] handleMessage -> DEBU b52 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:12496793612494837772 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.831 UTC [gossip.pull] HandleMessage -> DEBU b53 GossipMessage: tag:EMPTY hello:<nonce:12496793612494837772 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b55 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [gossip.pull] SendDigest -> DEBU b56 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:24.833 UTC [gossip.gossip] handleMessage -> DEBU b57 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.comm] func1 -> DEBU b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b5a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:24.851 UTC [msp] DeserializeIdentity -> DEBU b5d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b5e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b5f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b60 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdb Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs"
orderer0.example.com | "2019-05-02 09:27:31.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.2µs "
orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.1µs "
orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs"
orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdf Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs"
orderer0.example.com | "2019-05-02 09:27:31.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs "
orderer0.example.com | "2019-05-02 09:27:31.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:31.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce4 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs"
orderer0.example.com | "2019-05-02 09:27:32.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.9µs "
orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ce6 Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] propose -> INFO ce7 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] 2 -> DEBU ce8 Proposed block [4] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 3829 bytes to 2 on channel businesschannel took 22.4µs"
orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 3829 bytes to 3 on channel businesschannel took 19.4µs"
orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs "
orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU cec Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 321µs "
orderer0.example.com | "2019-05-02 09:27:32.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs"
orderer0.example.com | "2019-05-02 09:27:32.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 3 on channel businesschannel took 155.4µs"
orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2069ms "
orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs "
orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs"
orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel businesschannel took 99.1µs"
orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs "
orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] writeBlock -> INFO cf7 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:32.495 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cf8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cf9 Sign: plaintext: 0A020802120B0A090A03010203100418...E02EDFA4D45B9D6BFDE5AB324DC39AA4 "
orderer0.example.com | "2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cfa Sign: digest: 09950A335BFF8CDB28DBD69079831BFC246A8BDC8347AB8D99A66E1A279D884C "
orderer0.example.com | "2019-05-02 09:27:32.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.6µs "
orderer0.example.com | "2019-05-02 09:27:32.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.501 UTC [fsblkstorage] indexBlock -> DEBU cfe Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets=
peer0.org1.example.com | "2019-05-02 09:27:24.854 UTC [policies] Evaluate -> DEBU b63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.855 UTC [cauthdsl] func1 -> DEBU b64 0xc002255bc0 gate 1556789244855458800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.855 UTC [cauthdsl] func2 -> DEBU b65 0xc002255bc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b66 0xc002255bc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b67 0xc002255bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b68 0xc002255bc0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func1 -> DEBU b69 0xc002255bc0 gate 1556789244855458800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func1 -> DEBU b6d 0xc0022ab3a0 gate 1556789244857139100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6e 0xc0022ab3a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6f 0xc0022ab3a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b70 0xc0022ab3a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [msp.identity] Verify -> DEBU b71 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..|
peer0.org1.example.com | 00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|"
peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [msp.identity] Verify -> DEBU b72 Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!|
peer0.org1.example.com | 00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..|
peer0.org1.example.com | 00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y|
peer0.org1.example.com | 00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..|
peer0.org1.example.com | 00000040 42 30 64 b5 7c 5a |B0d.|Z|"
peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [cauthdsl] func2 -> DEBU b73 0xc0022ab3a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [cauthdsl] func1 -> DEBU b74 0xc0022ab3a0 gate 1556789244857139100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b75 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b77 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b78 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] handleAliveMessage -> DEBU b79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] handleAliveMessage -> DEBU b7f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU b80 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [gossip.discovery] sendMemResponse -> DEBU b81 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b82 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.comm] Send -> DEBU b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.discovery] sendMemResponse -> DEBU b86 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.comm] sendToEndpoint -> DEBU b87 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:24.871 UTC [gossip.comm] sendToEndpoint -> DEBU b88 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [gossip.comm] func1 -> DEBU b89 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [gossip.gossip] handleMessage -> DEBU b8a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [msp] DeserializeIdentity -> DEBU b8b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [gossip.gossip] handleMessage -> DEBU b8e Exiting"
orderer0.example.com | txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:32.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU cff Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.505 UTC [fsblkstorage] updateCheckpoint -> DEBU d00 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80790], isChainEmpty=[false], lastBlockNumber=[4]"
orderer0.example.com | "2019-05-02 09:27:32.505 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d01 [channel: businesschannel] Wrote block [4]"
orderer0.example.com | "2019-05-02 09:27:32.559 UTC [orderer.common.broadcast] Handle -> WARN d02 Error reading from 172.18.0.8:57260: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:32.560 UTC [orderer.common.server] func1 -> DEBU d03 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:32.561 UTC [comm.grpc.server] 1 -> INFO d04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57260 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1085268s
orderer0.example.com | "2019-05-02 09:27:32.564 UTC [grpc] infof -> DEBU d05 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:32.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs"
orderer0.example.com | "2019-05-02 09:27:32.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 7.7923ms "
orderer0.example.com | "2019-05-02 09:27:32.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs"
orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs"
orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.6µs "
orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.2µs "
orderer0.example.com | "2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs"
orderer0.example.com | "2019-05-02 09:27:33.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.7µs "
orderer0.example.com | "2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs"
orderer0.example.com | "2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs"
orderer0.example.com | "2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 665.1µs "
orderer0.example.com | "2019-05-02 09:27:33.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 816.2µs "
orderer0.example.com | "2019-05-02 09:27:33.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs"
orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.9µs "
orderer0.example.com | "2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 23.8µs"
orderer0.example.com | "2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 21µs"
orderer0.example.com | "2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs "
orderer0.example.com | "2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.9µs "
orderer0.example.com | "2019-05-02 09:27:33.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:33.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d21 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d22 Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs"
orderer0.example.com | "2019-05-02 09:27:34.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.2µs "
orderer0.example.com | "2019-05-02 09:27:34.412 UTC [orderer.common.server] Broadcast -> DEBU d24 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:34.413 UTC [orderer.common.broadcast] Handle -> DEBU d25 Starting new broadcast loop for 172.18.0.8:57282"
peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [gossip.comm] func1 -> DEBU b8f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [gossip.gossip] handleMessage -> DEBU b90 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [msp] DeserializeIdentity -> DEBU b91 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b93 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b94 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b98 0xc00236b0f0 gate 1556789245026754100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b99 0xc00236b0f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9a 0xc00236b0f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9b 0xc00236b0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9c 0xc00236b0f0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b9d 0xc00236b0f0 gate 1556789245026754100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba1 0xc00236b930 gate 1556789245027113000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba2 0xc00236b930 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba3 0xc00236b930 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba4 0xc00236b930 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba7 0xc00236b930 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba8 0xc00236b930 gate 1556789245027113000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU baa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bab Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp] DeserializeIdentity -> DEBU bad Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [gossip.gossip] handleMessage -> DEBU bae Exiting"
orderer0.example.com | "2019-05-02 09:27:34.470 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d26 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57282 with txid 'f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [policies] Evaluate -> DEBU d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func1 -> DEBU d2c 0xc00084c660 gate 1556789254472084400 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2d 0xc00084c660 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2e 0xc00084c660 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2f 0xc00084c660 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d30 Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.|
orderer0.example.com | 00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|"
orderer0.example.com | "2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d31 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a|
orderer0.example.com | 00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)|
orderer0.example.com | 00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......|
orderer0.example.com | 00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2|
orderer0.example.com | 00000040 e6 e4 37 e8 a5 f7 |..7...|"
orderer0.example.com | "2019-05-02 09:27:34.473 UTC [cauthdsl] func2 -> DEBU d32 0xc00084c660 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:34.473 UTC [cauthdsl] func1 -> DEBU d33 0xc00084c660 gate 1556789254472084400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d36 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d38 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:34.474 UTC [orderer.common.blockcutter] Ordered -> DEBU d3a Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:34.475 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d3b [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57282"
orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs"
orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs"
orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.8µs "
orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs "
orderer0.example.com | "2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d40 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d41 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 128.4µs"
orderer0.example.com | "2019-05-02 09:27:34.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.5µs "
orderer0.example.com | "2019-05-02 09:27:34.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 93µs"
orderer0.example.com | "2019-05-02 09:27:34.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs"
peer0.org1.example.com | "2019-05-02 09:27:25.072 UTC [msp.identity] Sign -> DEBU baf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151011 "
peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb0 Sign: digest: F4D1C49B625AE5B24AE96451DB264D062B621D6054CBE6DC551BD8EFB9703AD5 "
peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [gossip.comm] Send -> DEBU bb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [msp] DeserializeIdentity -> DEBU bb4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [gossip.pull] Hello -> DEBU bb5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bb9 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1956372221717732963 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.pull] Hello -> DEBU bba Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bbb Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10100156514667359141 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.077 UTC [gossip.pull] Hello -> DEBU bbc Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:25.077 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4191687957081881326 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4191687957081881326 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] Send -> DEBU bb6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [msp] DeserializeIdentity -> DEBU bc0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] Send -> DEBU bc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1956372221717732963 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.081 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10100156514667359141 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.082 UTC [gossip.comm] sendToEndpoint -> DEBU bc7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.gossip] handleMessage -> DEBU bca Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.pull] HandleMessage -> DEBU bcd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bce Exiting"
orderer0.example.com | "2019-05-02 09:27:34.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 514.3µs "
orderer0.example.com | "2019-05-02 09:27:34.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.5µs "
orderer0.example.com | "2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs"
orderer0.example.com | "2019-05-02 09:27:35.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.6µs "
orderer0.example.com | "2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs"
orderer0.example.com | "2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4f Sending msg of 28 bytes to 3 on channel businesschannel took 46.8µs"
orderer0.example.com | "2019-05-02 09:27:35.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 553.5µs "
orderer0.example.com | "2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3489ms "
orderer0.example.com | "2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU d52 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d53 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs"
orderer0.example.com | "2019-05-02 09:27:35.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.7µs "
orderer0.example.com | "2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs"
orderer0.example.com | "2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d58 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs"
orderer0.example.com | "2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.1µs "
orderer0.example.com | "2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 393.1µs "
orderer0.example.com | "2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs"
orderer0.example.com | "2019-05-02 09:27:36.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs "
orderer0.example.com | "2019-05-02 09:27:36.326 UTC [orderer.common.server] replicateDisabledChains -> DEBU d60 No inactive chains to try to replicate"
orderer0.example.com | "2019-05-02 09:27:36.477 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d61 Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:36.478 UTC [orderer.consensus.etcdraft] propose -> INFO d62 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:36.486 UTC [orderer.consensus.etcdraft] 2 -> DEBU d63 Proposed block [5] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:36.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU d64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d65 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs"
orderer0.example.com | "2019-05-02 09:27:36.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.6µs "
orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 4831 bytes to 2 on channel businesschannel took 24.8µs"
orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d68 Sending msg of 4831 bytes to 3 on channel businesschannel took 16.3µs"
orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU d69 Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer2.example.com(orderer2.example.com:7050) took 361.7µs "
orderer0.example.com | "2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6a Sending msg of 28 bytes to 2 on channel businesschannel took 11.7µs"
orderer0.example.com | "2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs"
orderer0.example.com | "2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer1.example.com(orderer1.example.com:7050) took 149.2µs "
orderer0.example.com | "2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 807.2µs "
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bcf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.pull] HandleMessage -> DEBU bd0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.gossip] handleMessage -> DEBU bd4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU bd5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bd6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [msp.identity] Verify -> DEBU bd7 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.|
peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|"
peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [msp.identity] Verify -> DEBU bd8 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`|
peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e|
peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P|
peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o|
peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|"
peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] isSentByMe -> DEBU bda Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bdb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bde Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bdf Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.pull] HandleMessage -> DEBU be0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU be3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be4 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.|
peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|"
peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be5 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`|
peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e|
peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P|
peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o|
peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|"
peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be7 Verify: sig = 00000000 30 44 02 20 70 c4 3a 23 15 fc 4b 10 a0 4c 7d b2 |0D. p.:#..K..L}.|
peer0.org1.example.com | 00000010 19 14 29 64 0d 7b 0c c1 73 da 27 45 dd 1a df 44 |..)d.{..s.'E...D|
peer0.org1.example.com | 00000020 6a 67 e9 6a 02 20 2b fc d2 18 77 ae 37 01 3a e2 |jg.j. +...w.7.:.|
peer0.org1.example.com | 00000030 97 51 92 20 82 5e 7c 52 fd f3 2c 27 1e d8 9c 5a |.Q. .^|R..,'...Z|
peer0.org1.example.com | 00000040 a6 df 5f 3a 2c ee |.._:,.|"
peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [gossip.discovery] handleAliveMessage -> DEBU be8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [gossip.discovery] isSentByMe -> DEBU be9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleAliveMessage -> DEBU bea Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU beb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.gossip] handleMessage -> DEBU bec Exiting"
orderer0.example.com | "2019-05-02 09:27:36.802 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0942ms "
orderer0.example.com | "2019-05-02 09:27:36.807 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs"
orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs"
orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs "
orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d72 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d76 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d77 Sign: plaintext: 0A020802120B0A090A03010203100418...8D87BD4412B1A81CC613E34DE8F22984 "
orderer0.example.com | "2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d78 Sign: digest: 6035AB39F3AF415B7E1B9C43BA898201E49D40DA63DC7DCEA85B2B1DD927BA29 "
orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs "
orderer0.example.com | "2019-05-02 09:27:36.811 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.815 UTC [fsblkstorage] indexBlock -> DEBU d7a Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets=
orderer0.example.com | txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.819 UTC [fsblkstorage] updateCheckpoint -> DEBU d7d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86501], isChainEmpty=[false], lastBlockNumber=[5]"
orderer0.example.com | "2019-05-02 09:27:36.819 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d7e [channel: businesschannel] Wrote block [5]"
orderer0.example.com | "2019-05-02 09:27:36.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.923 UTC [grpc] infof -> DEBU d80 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:36.925 UTC [orderer.common.broadcast] Handle -> WARN d81 Error reading from 172.18.0.8:57282: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:36.934 UTC [orderer.common.server] func1 -> DEBU d82 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:36.938 UTC [comm.grpc.server] 1 -> INFO d83 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.5251949s
orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d84 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs"
orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs"
orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs "
orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs "
orderer0.example.com | "2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:37.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:37.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel testchainid took 49.6µs"
orderer0.example.com | "2019-05-02 09:27:37.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs "
orderer0.example.com | "2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8d Sending msg of 28 bytes to 2 on channel businesschannel took 83.6µs"
orderer0.example.com | "2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 3 on channel businesschannel took 30.7µs"
orderer0.example.com | "2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.7µs "
orderer0.example.com | "2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 273.8µs "
orderer0.example.com | "2019-05-02 09:27:37.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:37.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:37.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU bed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bee Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.|
peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|"
peer0.org1.example.com | "2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`|
peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e|
peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P|
peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o|
peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|"
peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] isSentByMe -> DEBU bf2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bf4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.099 UTC [msp] DeserializeIdentity -> DEBU bf5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU bfc 0xc00254c000 gate 1556789245101163900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfd 0xc00254c000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfe 0xc00254c000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bff 0xc00254c000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU c00 0xc00254c000 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU c01 0xc00254c000 gate 1556789245101163900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func1 -> DEBU c05 0xc00254c860 gate 1556789245103217900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c06 0xc00254c860 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c07 0xc00254c860 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c08 0xc00254c860 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.104 UTC [msp.identity] Verify -> DEBU c09 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..|
peer0.org1.example.com | 00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|"
orderer0.example.com | "2019-05-02 09:27:37.718 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel testchainid took 28µs"
orderer0.example.com | "2019-05-02 09:27:37.718 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373µs "
orderer0.example.com | "2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d96 Sending msg of 28 bytes to 2 on channel businesschannel took 48.9µs"
orderer0.example.com | "2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs"
orderer0.example.com | "2019-05-02 09:27:37.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 496.9µs "
orderer0.example.com | "2019-05-02 09:27:37.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 653.2µs "
orderer0.example.com | "2019-05-02 09:27:37.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:37.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs"
orderer0.example.com | "2019-05-02 09:27:38.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.9µs "
orderer0.example.com | "2019-05-02 09:27:38.286 UTC [orderer.common.server] Broadcast -> DEBU d9f Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:38.286 UTC [orderer.common.broadcast] Handle -> DEBU da0 Starting new broadcast loop for 172.18.0.8:57296"
orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel businesschannel took 78.4µs"
orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da2 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs"
orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.9µs "
orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs "
orderer0.example.com | "2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 3 on channel testchainid took 41.2µs"
orderer0.example.com | "2019-05-02 09:27:38.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU da9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs "
orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs"
orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dab Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs"
orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs "
orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.9µs "
orderer0.example.com | "2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU daf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 3 on channel testchainid took 20µs"
orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] sendMessage -> DEBU db2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs "
orderer0.example.com | "2019-05-02 09:27:39.323 UTC [orderer.common.broadcast] ProcessMessage -> DEBU db3 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57296 with txid '592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func1 -> DEBU db9 0xc000888f30 gate 1556789259325922700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dba 0xc000888f30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dbb 0xc000888f30 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:39.327 UTC [cauthdsl] func2 -> DEBU dbc 0xc000888f30 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbd Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......|
peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [msp.identity] Verify -> DEBU c0a Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!|
peer0.org1.example.com | 00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..|
peer0.org1.example.com | 00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y|
peer0.org1.example.com | 00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..|
peer0.org1.example.com | 00000040 42 30 64 b5 7c 5a |B0d.|Z|"
peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [cauthdsl] func2 -> DEBU c0b 0xc00254c860 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [cauthdsl] func1 -> DEBU c0c 0xc00254c860 gate 1556789245103217900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c0f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c12 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU c13 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.117 UTC [gossip.gossip] handleMessage -> DEBU c14 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10423356573700148554 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.118 UTC [gossip.pull] HandleMessage -> DEBU c15 GossipMessage: tag:EMPTY hello:<nonce:10423356573700148554 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.118 UTC [gossip.pull] SendDigest -> DEBU c16 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:25.119 UTC [gossip.gossip] handleMessage -> DEBU c17 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c18 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c19 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU c1a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c1b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.|
peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|"
peer0.org1.example.com | "2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1d Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X|
peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..|
peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E|
peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`|
peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|"
peer0.org1.example.com | "2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1f Verify: sig = 00000000 30 45 02 21 00 c6 56 1a 7b c1 b9 02 fc 93 14 71 |0E.!..V.{......q|
peer0.org1.example.com | 00000010 63 35 4c 96 b6 f7 bf 3d dd 13 0e 35 e9 e9 fe 1d |c5L....=...5....|
peer0.org1.example.com | 00000020 00 94 91 44 79 02 20 4a dd ed 07 ad 12 4b b6 1b |...Dy. J.....K..|
peer0.org1.example.com | 00000030 24 4a 8b 92 bf 0d 42 b0 0e 2e 62 32 ad 14 42 32 |$J....B...b2..B2|
peer0.org1.example.com | 00000040 47 f3 51 d5 0d 5c 0f |G.Q..\.|"
peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] handleAliveMessage -> DEBU c20 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c21 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c22 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c23 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c24 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c25 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] handleAliveMessage -> DEBU c26 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU c27 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.134 UTC [gossip.discovery] sendMemResponse -> DEBU c28 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:25.136 UTC [msp] DeserializeIdentity -> DEBU c29 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.138 UTC [msp] DeserializeIdentity -> DEBU c2a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.140 UTC [gossip.comm] Send -> DEBU c2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.discovery] sendMemResponse -> DEBU c2c Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:25.172 UTC [endorser] ProcessProposal -> DEBU c2f Entering: request from 172.18.0.8:57266"
peer0.org1.example.com | "2019-05-02 09:27:25.172 UTC [protoutils] ValidateProposalMessage -> DEBU c30 ValidateProposalMessage starts for signed proposal 0xc00232c0f0"
peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] validateChannelHeader -> DEBU c31 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c32 begin"
peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:25.174 UTC [protoutils] checkSignatureFromCreator -> DEBU c34 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:25.174 UTC [msp.identity] Verify -> DEBU c35 Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........|
peer0.org1.example.com | 00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|"
peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [msp.identity] Verify -> DEBU c36 Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;|
peer0.org1.example.com | 00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6|
peer0.org1.example.com | 00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...|
peer0.org1.example.com | 00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..|
peer0.org1.example.com | 00000040 ac 58 cf 50 f8 bd |.X.P..|"
peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [protoutils] checkSignatureFromCreator -> DEBU c37 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c38 validateChaincodeProposalMessage starts for proposal 0xc00017eee0, header 0xc00232c500"
peer0.org1.example.com | "2019-05-02 09:27:25.176 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c39 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:25.176 UTC [endorser] preProcess -> DEBU c3a [][19510801] processing txid: 195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814"
peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [endorser] SimulateProposal -> DEBU c3b [][19510801] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [endorser] callChaincode -> INFO c3c [][19510801] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [chaincode] Execute -> DEBU c3d Entry"
peer0.org1.example.com | "2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3e Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........|
peer0.org1.example.com | 00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|"
peer0.org1.example.com | "2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3f Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;|
peer0.org1.example.com | 00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6|
peer0.org1.example.com | 00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...|
peer0.org1.example.com | 00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..|
peer0.org1.example.com | 00000040 ac 58 cf 50 f8 bd |.X.P..|"
peer0.org1.example.com | "2019-05-02 09:27:25.179 UTC [lifecycle] InstallChaincode -> DEBU c40 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..."
peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] handleMessage -> DEBU c41 [19510801] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] Notify -> DEBU c42 [19510801] notifying Txid:195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] Execute -> DEBU c43 Exit"
peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] callChaincode -> INFO c44 [][19510801] Exit chaincode: name:"_lifecycle" (3ms)"
peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] SimulateProposal -> DEBU c45 [][19510801] Exit"
peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] func1 -> DEBU c46 Exit: request from 172.18.0.8:57266"
peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [comm.grpc.server] 1 -> INFO c47 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57266 grpc.code=OK grpc.call_duration=9.3992ms
peer0.org1.example.com | "2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c48 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c49 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:25.194 UTC [gossip.gossip] handleMessage -> DEBU c4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:13530515940468942437 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.195 UTC [gossip.pull] HandleMessage -> DEBU c4b GossipMessage: tag:EMPTY hello:<nonce:13530515940468942437 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.197 UTC [gossip.pull] SendDigest -> DEBU c4e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:25.198 UTC [gossip.gossip] handleMessage -> DEBU c4f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c50 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c51 Exiting"
orderer0.example.com | 00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|"
orderer0.example.com | "2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbe Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..|
orderer0.example.com | 00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.|
orderer0.example.com | 00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@|
orderer0.example.com | 00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..|
orderer0.example.com | 00000040 ef 22 01 d3 23 c9 7c |."..#.||"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [cauthdsl] func2 -> DEBU dbf 0xc000888f30 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [cauthdsl] func1 -> DEBU dc0 0xc000888f30 gate 1556789259325922700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc3 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc5 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [orderer.common.blockcutter] Ordered -> DEBU dc7 Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:39.328 UTC [orderer.common.broadcast] ProcessMessage -> DEBU dc8 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57296"
orderer0.example.com | "2019-05-02 09:27:39.332 UTC [orderer.common.broadcast] Handle -> WARN dc9 Error reading from 172.18.0.8:57296: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:39.334 UTC [orderer.common.server] func1 -> DEBU dca Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:39.335 UTC [comm.grpc.server] 1 -> INFO dcb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1.0490441s
orderer0.example.com | "2019-05-02 09:27:39.333 UTC [grpc] infof -> DEBU dcc transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:39.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs"
orderer0.example.com | "2019-05-02 09:27:39.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU dce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 563µs "
orderer0.example.com | "2019-05-02 09:27:39.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs"
orderer0.example.com | "2019-05-02 09:27:39.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.7µs "
orderer0.example.com | "2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs"
orderer0.example.com | "2019-05-02 09:27:39.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs "
orderer0.example.com | "2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 37.6µs"
orderer0.example.com | "2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 206.4µs "
orderer0.example.com | "2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel businesschannel took 34.3µs"
orderer0.example.com | "2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.5µs "
orderer0.example.com | "2019-05-02 09:27:39.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:39.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:40.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:40.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs"
orderer0.example.com | "2019-05-02 09:27:40.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs "
orderer0.example.com | "2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddf Sending msg of 28 bytes to 2 on channel businesschannel took 36.2µs"
orderer0.example.com | "2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs"
orderer0.example.com | "2019-05-02 09:27:40.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 236.7µs "
orderer0.example.com | "2019-05-02 09:27:40.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2045ms "
orderer0.example.com | "2019-05-02 09:27:40.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU de3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:40.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.discovery] handleMsgFromComm -> DEBU c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.204 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c53 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:25.204 UTC [msp] DeserializeIdentity -> DEBU c54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c56 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c57 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [policies] Evaluate -> DEBU c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c5b 0xc0026153e0 gate 1556789245207239700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5c 0xc0026153e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5d 0xc0026153e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5e 0xc0026153e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5f 0xc0026153e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c60 0xc0026153e0 gate 1556789245207239700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func1 -> DEBU c64 0xc002615c20 gate 1556789245208489100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c65 0xc002615c20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c66 0xc002615c20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c67 0xc002615c20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c68 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o|
peer0.org1.example.com | 00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|"
peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c69 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b|
peer0.org1.example.com | 00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..|
peer0.org1.example.com | 00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..|
peer0.org1.example.com | 00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..|
peer0.org1.example.com | 00000040 23 a8 ae ee 39 1f |#...9.|"
peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [cauthdsl] func2 -> DEBU c6a 0xc002615c20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [cauthdsl] func1 -> DEBU c6b 0xc002615c20 gate 1556789245208489100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:25.210 UTC [policies] Evaluate -> DEBU c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] handleAliveMessage -> DEBU c70 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c71 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c72 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 "
peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c73 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 "
peer0.org1.example.com | "2019-05-02 09:27:25.213 UTC [gossip.discovery] learnExistingMembers -> DEBU c74 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:25.216 UTC [gossip.discovery] learnExistingMembers -> DEBU c75 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.217 UTC [gossip.discovery] handleAliveMessage -> DEBU c76 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [gossip.discovery] sendMemResponse -> DEBU c77 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [msp] DeserializeIdentity -> DEBU c78 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c79 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [gossip.comm] Send -> DEBU c7b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.discovery] sendMemResponse -> DEBU c7c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU c7f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.831 UTC [gossip.comm] func1 -> DEBU c80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.831 UTC [gossip.gossip] handleMessage -> DEBU c81 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.pull] HandleMessage -> DEBU c82 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.gossip] handleMessage -> DEBU c85 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.pull] SendRes -> DEBU c86 Sending 2 IDENTITY_MSG items to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c87 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.comm] Send -> DEBU c88 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c89 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c8a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c8b Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] Send -> DEBU c8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:26.081 UTC [gossip.gossip] handleMessage -> DEBU c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.081 UTC [msp] DeserializeIdentity -> DEBU c90 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c92 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c93 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func1 -> DEBU c97 0xc0028083e0 gate 1556789246083989400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c98 0xc0028083e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c99 0xc0028083e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9a 0xc0028083e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9b 0xc0028083e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func1 -> DEBU c9c 0xc0028083e0 gate 1556789246083989400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [policies] Evaluate -> DEBU c9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func1 -> DEBU ca0 0xc002808c20 gate 1556789246086477200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca1 0xc002808c20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca2 0xc002808c20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:26.087 UTC [gossip.comm] func1 -> DEBU ca3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.087 UTC [cauthdsl] func2 -> DEBU ca4 0xc002808c20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca5 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!|
peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca6 Verify: sig = 00000000 30 45 02 21 00 aa 60 a8 92 c2 2e b3 38 2f f5 c7 |0E.!..`.....8/..|
peer0.org1.example.com | 00000010 7f 31 7c 67 57 c2 f5 44 17 6e 47 86 88 c0 8d 17 |.1|gW..D.nG.....|
peer0.org1.example.com | 00000020 8b a6 f1 0d cc 02 20 67 22 c6 13 53 4e 49 aa 82 |...... g"..SNI..|
peer0.org1.example.com | 00000030 d7 f7 1c 94 93 95 0d 78 e7 99 b9 45 cd 10 02 3e |.......x...E...>|
peer0.org1.example.com | 00000040 a5 67 8e 47 21 e0 6a |.g.G!.j|"
peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [cauthdsl] func2 -> DEBU ca7 0xc002808c20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [cauthdsl] func1 -> DEBU ca8 0xc002808c20 gate 1556789246086477200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU ca9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU cab Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [policies] Evaluate -> DEBU cac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [msp] DeserializeIdentity -> DEBU cad Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:40.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU de5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:40.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs "
orderer0.example.com | "2019-05-02 09:27:40.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs"
orderer0.example.com | "2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de8 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs"
orderer0.example.com | "2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs"
orderer0.example.com | "2019-05-02 09:27:40.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.5µs "
orderer0.example.com | "2019-05-02 09:27:40.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:40.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.8003ms "
orderer0.example.com | "2019-05-02 09:27:40.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ded Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU dee Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs"
orderer0.example.com | "2019-05-02 09:27:41.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.6µs "
orderer0.example.com | "2019-05-02 09:27:41.331 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU df1 Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:41.332 UTC [orderer.consensus.etcdraft] propose -> INFO df2 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:41.333 UTC [orderer.consensus.etcdraft] 2 -> DEBU df3 Proposed block [6] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 3181 bytes to 2 on channel businesschannel took 39.5µs"
peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [gossip.pull] HandleMessage -> DEBU caf GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [msp] DeserializeIdentity -> DEBU cb0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [msp] DeserializeIdentity -> DEBU cb2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [gossip.gossip] func2 -> DEBU cb4 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]"
peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.pull] HandleMessage -> DEBU cb5 Added ̣P<CCA3><50>S<EFBFBD><53>WtK̺<4B><CCBA><EFBFBD><EFBFBD>M6a<36>s)<13><><1A> 0 to the in memory item map, total items: 3"
peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [msp] DeserializeIdentity -> DEBU cb8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cba Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [policies] Evaluate -> DEBU cbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [cauthdsl] func1 -> DEBU cbf 0xc002c42080 gate 1556789246096704600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc0 0xc002c42080 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc1 0xc002c42080 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc2 0xc002c42080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc3 0xc002c42080 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [cauthdsl] func1 -> DEBU cc4 0xc002c42080 gate 1556789246096704600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func1 -> DEBU cc8 0xc002c428c0 gate 1556789246099359600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cc9 0xc002c428c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cca 0xc002c428c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU ccb 0xc002c428c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccc Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......|
peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|"
peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccd Verify: sig = 00000000 30 44 02 20 12 0d 5c d7 38 c9 55 c5 70 5c bc 7c |0D. ..\.8.U.p\.||
peer0.org1.example.com | 00000010 4b c8 e7 16 65 68 98 43 4f 52 9f f9 a1 7c 0d 32 |K...eh.COR...|.2|
peer0.org1.example.com | 00000020 65 d8 d6 0d 02 20 54 40 e0 e2 9d e8 e1 b6 a9 d7 |e.... T@........|
peer0.org1.example.com | 00000030 80 f4 1c 5b e0 b5 88 54 d2 45 20 68 52 8a de e6 |...[...T.E hR...|
peer0.org1.example.com | 00000040 26 d9 9d 93 d8 7e |&....~|"
peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU cce 0xc002c428c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [cauthdsl] func1 -> DEBU ccf 0xc002c428c0 gate 1556789246099359600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 3181 bytes to 3 on channel businesschannel took 18.9µs"
orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs "
orderer0.example.com | "2019-05-02 09:27:41.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer2.example.com(orderer2.example.com:7050) took 561µs "
orderer0.example.com | "2019-05-02 09:27:41.407 UTC [orderer.common.cluster.step] handleMessage -> DEBU df8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df9 Sending msg of 28 bytes to 2 on channel businesschannel took 265.5µs"
orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfa Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs"
orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.8µs "
orderer0.example.com | "2019-05-02 09:27:41.409 UTC [orderer.consensus.etcdraft] writeBlock -> INFO dfc Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:41.409 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dfd [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:41.409 UTC [msp.identity] Sign -> DEBU dfe Sign: plaintext: 0A020802120B0A090A03010203100418...D151EC9BF7DFDE5658923E26A8AEB4BD "
orderer0.example.com | "2019-05-02 09:27:41.410 UTC [msp.identity] Sign -> DEBU dff Sign: digest: 0929A37CDAAD05CF07385DEFE3C8BEB23C7FF4732E3F4F0D02A6404DFB92BAEA "
orderer0.example.com | "2019-05-02 09:27:41.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU e00 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.5µs "
orderer0.example.com | "2019-05-02 09:27:41.412 UTC [fsblkstorage] indexBlock -> DEBU e02 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets=
orderer0.example.com | txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:41.414 UTC [fsblkstorage] updateCheckpoint -> DEBU e03 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90563], isChainEmpty=[false], lastBlockNumber=[6]"
orderer0.example.com | "2019-05-02 09:27:41.414 UTC [orderer.commmon.multichannel] commitBlock -> DEBU e04 [channel: businesschannel] Wrote block [6]"
orderer0.example.com | "2019-05-02 09:27:41.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.433 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel businesschannel took 180.2µs"
orderer0.example.com | "2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs"
orderer0.example.com | "2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 381.6µs "
orderer0.example.com | "2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.7µs "
orderer0.example.com | "2019-05-02 09:27:41.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd2 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cd6 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd9 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:41.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 57.7µs"
orderer0.example.com | "2019-05-02 09:27:41.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs "
orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 2 on channel businesschannel took 44.6µs"
orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs"
orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.4µs "
orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs "
orderer0.example.com | "2019-05-02 09:27:41.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:41.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 10.3µs"
orderer0.example.com | "2019-05-02 09:27:42.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs "
orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs "
orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs"
orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs"
orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 451.5µs "
orderer0.example.com | "2019-05-02 09:27:42.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 31.6µs"
orderer0.example.com | "2019-05-02 09:27:42.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.2µs "
orderer0.example.com | "2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel businesschannel took 63.8µs"
orderer0.example.com | "2019-05-02 09:27:42.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.5µs "
orderer0.example.com | "2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs"
orderer0.example.com | "2019-05-02 09:27:42.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 461.7µs "
orderer0.example.com | "2019-05-02 09:27:42.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:42.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 52.2µs"
orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs "
orderer0.example.com | "2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 49.4µs"
orderer0.example.com | "2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 27.8µs"
orderer0.example.com | "2019-05-02 09:27:43.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 515.7µs "
orderer0.example.com | "2019-05-02 09:27:43.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5106ms "
orderer0.example.com | "2019-05-02 09:27:43.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:43.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:43.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cda Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.gossip] func2 -> DEBU cdb Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cdc Added <20>?Y;.<2E>ZW<5A>m<EFBFBD>~<7E><><EFBFBD><EFBFBD><6D>ܮ@S<>^u<> to the in memory item map, total items: 4"
peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.gossip] handleMessage -> DEBU cdd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU cde Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.pull] HandleMessage -> DEBU cdf GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [msp] DeserializeIdentity -> DEBU ce0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU ce1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.pull] SendRes -> DEBU ce2 Sending 1 IDENTITY_MSG items to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:26.284 UTC [gossip.channel] reportMembershipChanges -> INFO ce3 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]"
peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] IsLeader -> DEBU ce5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510031801 "
peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce7 Sign: digest: 2FD57F641333F770D98B5F06B717144D825CB541233AB40BA3CA975EAE26E353 "
peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ce9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ceb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [gossip.comm] Send -> DEBU ced Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cee Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cef Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [endorser] ProcessProposal -> DEBU cf2 Entering: request from 172.18.0.8:57282"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] ValidateProposalMessage -> DEBU cf3 ValidateProposalMessage starts for signed proposal 0xc0023a8000"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] validateChannelHeader -> DEBU cf4 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf5 begin"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf7 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf8 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.|
peer0.org1.example.com | 00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|"
peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf9 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.|
peer0.org1.example.com | 00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-|
peer0.org1.example.com | 00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].|
peer0.org1.example.com | 00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...|
peer0.org1.example.com | 00000040 b9 f5 68 c6 9b a4 94 |..h....|"
peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] checkSignatureFromCreator -> DEBU cfa exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfb validateChaincodeProposalMessage starts for proposal 0xc00039ed90, header 0xc0023a8410"
peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfc validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] preProcess -> DEBU cfd [][3c8f6041] processing txid: 3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892"
peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] SimulateProposal -> DEBU cfe [][3c8f6041] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] callChaincode -> INFO cff [][3c8f6041] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [chaincode] Execute -> DEBU d00 Entry"
peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d01 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.|
peer0.org1.example.com | 00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|"
peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d02 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.|
peer0.org1.example.com | 00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-|
peer0.org1.example.com | 00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].|
peer0.org1.example.com | 00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...|
peer0.org1.example.com | 00000040 b9 f5 68 c6 9b a4 94 |..h....|"
peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [lifecycle] QueryInstalledChaincodes -> DEBU d03 received invocation of QueryInstalledChaincodes"
peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] handleMessage -> DEBU d04 [3c8f6041] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] Notify -> DEBU d05 [3c8f6041] notifying Txid:3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] Execute -> DEBU d06 Exit"
peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [endorser] callChaincode -> INFO d07 [][3c8f6041] Exit chaincode: name:"_lifecycle" (2ms)"
peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [endorser] SimulateProposal -> DEBU d08 [][3c8f6041] Exit"
peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [endorser] func1 -> DEBU d09 Exit: request from 172.18.0.8:57282"
peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [comm.grpc.server] 1 -> INFO d0a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57282 grpc.code=OK grpc.call_duration=5.0127ms
peer0.org1.example.com | "2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0b transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:27.922 UTC [endorser] ProcessProposal -> DEBU d0d Entering: request from 172.18.0.8:57286"
peer0.org1.example.com | "2019-05-02 09:27:27.922 UTC [protoutils] ValidateProposalMessage -> DEBU d0e ValidateProposalMessage starts for signed proposal 0xc0023a90e0"
peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [protoutils] validateChannelHeader -> DEBU d0f validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [protoutils] checkSignatureFromCreator -> DEBU d10 begin"
peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [msp] GetManagerForChain -> DEBU d11 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:27.924 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:27.924 UTC [msp.identity] newIdentity -> DEBU d13 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:27.925 UTC [protoutils] checkSignatureFromCreator -> DEBU d14 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:27.925 UTC [msp] Validate -> DEBU d15 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:27.926 UTC [msp] getCertificationChain -> DEBU d16 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:27.926 UTC [protoutils] checkSignatureFromCreator -> DEBU d17 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d18 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........|
peer0.org1.example.com | 00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|"
peer0.org1.example.com | "2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d19 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ|
peer0.org1.example.com | 00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d|
peer0.org1.example.com | 00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 |
orderer0.example.com | "2019-05-02 09:27:43.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.2µs "
orderer0.example.com | "2019-05-02 09:27:43.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 183.5µs"
orderer0.example.com | "2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs"
orderer0.example.com | "2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs"
orderer0.example.com | "2019-05-02 09:27:43.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.2µs "
orderer0.example.com | "2019-05-02 09:27:43.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7465ms "
orderer0.example.com | "2019-05-02 09:27:43.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:43.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.6µs "
orderer0.example.com | "2019-05-02 09:27:44.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 67.9µs"
orderer0.example.com | "2019-05-02 09:27:44.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 2 on channel businesschannel took 23µs"
orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs"
orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs "
orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.8µs "
orderer0.example.com | "2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 44.7µs"
orderer0.example.com | "2019-05-02 09:27:44.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2039ms "
orderer0.example.com | "2019-05-02 09:27:44.932 UTC [orderer.common.server] Broadcast -> DEBU e46 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:44.932 UTC [orderer.common.broadcast] Handle -> DEBU e47 Starting new broadcast loop for 172.18.0.8:57308"
orderer0.example.com | "2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs"
orderer0.example.com | "2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs"
orderer0.example.com | "2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs "
orderer0.example.com | "2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs "
orderer0.example.com | "2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:44.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e4e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57308 with txid '91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func1 -> DEBU e54 0xc0010e3a80 gate 1556789264957658800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e55 0xc0010e3a80 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e56 0xc0010e3a80 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e57 0xc0010e3a80 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e58 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.|
orderer0.example.com | 00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e59 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb|
orderer0.example.com | 00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...|
orderer0.example.com | 00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...|
orderer0.example.com | 00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....|
orderer0.example.com | 00000040 fe 64 c2 00 aa 35 b0 |.d...5.|"
peer0.org1.example.com | 00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`|
peer0.org1.example.com | 00000040 42 93 a3 05 09 51 |B....Q|"
peer0.org1.example.com | "2019-05-02 09:27:27.928 UTC [protoutils] checkSignatureFromCreator -> DEBU d1a exits successfully"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e5a 0xc0010e3a80 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func1 -> DEBU e5b 0xc0010e3a80 gate 1556789264957658800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5c Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5e Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e60 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:44.959 UTC [orderer.common.blockcutter] Ordered -> DEBU e62 Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:44.959 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e63 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57308"
orderer0.example.com | "2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU e65 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:44.963 UTC [orderer.common.broadcast] Handle -> WARN e64 Error reading from 172.18.0.8:57308: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:44.963 UTC [orderer.common.server] func1 -> DEBU e66 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:44.963 UTC [comm.grpc.server] 1 -> INFO e67 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57308 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.1271ms
orderer0.example.com | "2019-05-02 09:27:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:45.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs"
orderer0.example.com | "2019-05-02 09:27:45.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs "
orderer0.example.com | "2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 40.5µs"
orderer0.example.com | "2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 36.2µs"
orderer0.example.com | "2019-05-02 09:27:45.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 365µs "
orderer0.example.com | "2019-05-02 09:27:45.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.2µs "
orderer0.example.com | "2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 113.1µs"
orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs "
orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs"
orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 29µs"
orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs "
orderer0.example.com | "2019-05-02 09:27:45.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.7µs "
orderer0.example.com | "2019-05-02 09:27:45.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:45.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs"
orderer0.example.com | "2019-05-02 09:27:46.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.7µs "
orderer0.example.com | "2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 2 on channel businesschannel took 35.2µs"
orderer0.example.com | "2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 3 on channel businesschannel took 30.5µs"
orderer0.example.com | "2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.8µs "
orderer0.example.com | "2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.1µs "
orderer0.example.com | "2019-05-02 09:27:46.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:27.928 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1b validateChaincodeProposalMessage starts for proposal 0xc00039f8f0, header 0xc0023a9540"
peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [endorser] preProcess -> DEBU d1d [businesschannel][fd30334a] processing txid: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940"
peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d1e retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
peer0.org1.example.com | "2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d1f constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d20 constructing new tx simulator txid = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
peer0.org1.example.com | "2019-05-02 09:27:27.931 UTC [endorser] SimulateProposal -> DEBU d21 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.931 UTC [endorser] callChaincode -> INFO d22 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [chaincode] Execute -> DEBU d23 Entry"
peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d24 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........|
peer0.org1.example.com | 00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|"
peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d25 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ|
peer0.org1.example.com | 00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d|
peer0.org1.example.com | 00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 |
peer0.org1.example.com | 00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`|
peer0.org1.example.com | 00000040 42 93 a3 05 09 51 |B....Q|"
peer0.org1.example.com | "2019-05-02 09:27:27.933 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU d26 received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d27 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d28 [fd30334a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d29 [fd30334a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [stateleveldb] GetState -> DEBU d2a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2b [fd30334a] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2c [fd30334a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d2d [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2e [fd30334a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2f [fd30334a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [msp] GetManagerForChain -> DEBU d30 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d31 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d32 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d33 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d34 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleGetState -> DEBU d35 [fd30334a] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d36 [fd30334a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d37 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d38 [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d39 [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3b [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3c [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3e [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3f [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d40 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d41 [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d42 [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d43 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d44 [fd30334a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d45 [fd30334a] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d46 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1"
orderer0.example.com | "2019-05-02 09:27:46.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel testchainid took 8.9µs"
orderer0.example.com | "2019-05-02 09:27:46.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU e85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs "
orderer0.example.com | "2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs"
orderer0.example.com | "2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs"
orderer0.example.com | "2019-05-02 09:27:46.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.8µs "
orderer0.example.com | "2019-05-02 09:27:46.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920µs "
orderer0.example.com | "2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.960 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU e8c Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] propose -> INFO e8d Created block [7], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] 2 -> DEBU e8e Proposed block [7] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 3170 bytes to 2 on channel businesschannel took 21.8µs"
orderer0.example.com | "2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 3170 bytes to 3 on channel businesschannel took 12.8µs"
orderer0.example.com | "2019-05-02 09:27:46.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 390.1µs "
orderer0.example.com | "2019-05-02 09:27:46.965 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs "
orderer0.example.com | "2019-05-02 09:27:46.967 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs"
orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel businesschannel took 93.2µs"
orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs "
orderer0.example.com | "2019-05-02 09:27:46.969 UTC [orderer.consensus.etcdraft] writeBlock -> INFO e97 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:46.969 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU e98 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:46.969 UTC [msp.identity] Sign -> DEBU e99 Sign: plaintext: 0A020802120B0A090A03010203100418...DAA07E5AE5AA5E062D063F7B0FFC2EE0 "
orderer0.example.com | "2019-05-02 09:27:46.970 UTC [msp.identity] Sign -> DEBU e9a Sign: digest: 22E126E3A2EFA139FCCC3372D510C3F1A0191C4EC46B4CA19541E6F8ECCB3EA4 "
orderer0.example.com | "2019-05-02 09:27:46.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.6µs "
orderer0.example.com | "2019-05-02 09:27:46.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.976 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:46.980 UTC [fsblkstorage] indexBlock -> DEBU e9f Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets=
orderer0.example.com | txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:46.985 UTC [fsblkstorage] updateCheckpoint -> DEBU ea0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94614], isChainEmpty=[false], lastBlockNumber=[7]"
orderer0.example.com | "2019-05-02 09:27:46.986 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ea1 [channel: businesschannel] Wrote block [7]"
orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs"
orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.4µs "
orderer0.example.com | "2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs"
orderer0.example.com | "2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs"
orderer0.example.com | "2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.2µs "
orderer0.example.com | "2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.7µs "
orderer0.example.com | "2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d47 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d48 [fd30334a] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d49 [fd30334a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4b [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4c [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4e [fd30334a] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4f [fd30334a] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO d50 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] handleMessage -> DEBU d51 [fd30334a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] Notify -> DEBU d52 [fd30334a] notifying Txid:fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] Execute -> DEBU d53 Exit"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [endorser] callChaincode -> INFO d54 [businesschannel][fd30334a] Exit chaincode: name:"_lifecycle" (5ms)"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU d55 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] Done -> DEBU d56 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp] GetManagerForChain -> DEBU d57 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func1 -> DEBU d58 0xc002e16210 gate 1556789247937724200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d59 0xc002e16210 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5a 0xc002e16210 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5b 0xc002e16210 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5c Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5d Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d5e 0xc002e16210 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d5f 0xc002e16210 gate 1556789247937724200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d60 0xc002e16990 gate 1556789247938177800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d61 0xc002e16990 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d62 0xc002e16990 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d63 0xc002e16990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d64 0xc002e16990 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d65 0xc002e16990 gate 1556789247938177800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d66 0xc002e16f00 gate 1556789247938430000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d67 0xc002e16f00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d68 0xc002e16f00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d69 0xc002e16f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d6a 0xc002e16f00 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d6b 0xc002e16f00 gate 1556789247938430000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [transientstore] PersistWithConfig -> DEBU d6c Persisting private data to transient store for txid [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] at block height [3]"
peer0.org1.example.com | "2019-05-02 09:27:27.946 UTC [lockbasedtxmgr] Done -> DEBU d6d Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
peer0.org1.example.com | "2019-05-02 09:27:27.947 UTC [endorser] SimulateProposal -> DEBU d6e [businesschannel][fd30334a] Exit"
peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d6f [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d70 [businesschannel][fd30334a] escc for chaincode name:"_lifecycle" is escc"
peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] EndorseWithPlugin -> DEBU d71 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:27.949 UTC [msp.identity] Sign -> DEBU d72 Sign: plaintext: 0A20C4CE59135220423148E679B71478...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:27.950 UTC [msp.identity] Sign -> DEBU d73 Sign: digest: F6BAD1C1E9AE67521A19DE1116714EEE2CA67C454E4BEB9CC41B909165FE73D4 "
peer0.org1.example.com | "2019-05-02 09:27:27.951 UTC [endorser] EndorseWithPlugin -> DEBU d74 Exiting {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:27.951 UTC [endorser] endorseProposal -> DEBU d75 [businesschannel][fd30334a] Exit"
peer0.org1.example.com | "2019-05-02 09:27:27.952 UTC [lockbasedtxmgr] Done -> DEBU d76 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
orderer0.example.com | "2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:47.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:47.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs"
orderer0.example.com | "2019-05-02 09:27:47.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.4µs "
orderer0.example.com | "2019-05-02 09:27:47.735 UTC [orderer.common.server] Broadcast -> DEBU eae Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:27:47.735 UTC [orderer.common.broadcast] Handle -> DEBU eaf Starting new broadcast loop for 172.18.0.8:57322"
orderer0.example.com | "2019-05-02 09:27:47.765 UTC [orderer.common.broadcast] ProcessMessage -> DEBU eb0 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57322 with txid 'f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176' of type ENDORSER_TRANSACTION"
orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func1 -> DEBU eb6 0xc001129c30 gate 1556789267767870500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb7 0xc001129c30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb8 0xc001129c30 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eb9 0xc001129c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eba 0xc001129c30 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func1 -> DEBU ebb 0xc001129c30 gate 1556789267767870500 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebc Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
orderer0.example.com | "2019-05-02 09:27:47.771 UTC [cauthdsl] func1 -> DEBU ebf 0xc00118f090 gate 1556789267771324800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:47.771 UTC [cauthdsl] func2 -> DEBU ec0 0xc00118f090 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec1 0xc00118f090 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec2 0xc00118f090 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec3 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....|
orderer0.example.com | 00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|"
orderer0.example.com | "2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec4 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry|
orderer0.example.com | 00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..|
orderer0.example.com | 00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..|
orderer0.example.com | 00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d|
orderer0.example.com | 00000040 4f b1 ca 9f 55 1a |O...U.|"
orderer0.example.com | "2019-05-02 09:27:47.774 UTC [cauthdsl] func2 -> DEBU ec5 0xc00118f090 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:47.774 UTC [cauthdsl] func1 -> DEBU ec6 0xc00118f090 gate 1556789267771324800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:47.774 UTC [policies] Evaluate -> DEBU ec7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec9 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU eca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecb Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:27:47.777 UTC [orderer.common.blockcutter] Ordered -> DEBU ecd Enqueuing message into batch"
orderer0.example.com | "2019-05-02 09:27:47.777 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ece [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57322"
orderer0.example.com | "2019-05-02 09:27:47.780 UTC [grpc] infof -> DEBU ecf transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:47.780 UTC [orderer.common.broadcast] Handle -> WARN ed0 Error reading from 172.18.0.8:57322: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:47.781 UTC [orderer.common.server] func1 -> DEBU ed1 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:27:47.781 UTC [comm.grpc.server] 1 -> INFO ed2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57322 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.2738ms
orderer0.example.com | "2019-05-02 09:27:47.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed3 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs"
orderer0.example.com | "2019-05-02 09:27:47.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel businesschannel took 139µs"
orderer0.example.com | "2019-05-02 09:27:47.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs "
orderer0.example.com | "2019-05-02 09:27:47.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.8µs "
orderer0.example.com | "2019-05-02 09:27:47.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:27.952 UTC [endorser] func1 -> DEBU d77 Exit: request from 172.18.0.8:57286"
peer0.org1.example.com | "2019-05-02 09:27:27.953 UTC [comm.grpc.server] 1 -> INFO d78 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57286 grpc.code=OK grpc.call_duration=31.6105ms
peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d79 Got message: GossipMessage: tag:EMPTY hello:<nonce:5395959173992295496 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.gossip] handleMessage -> DEBU d7c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:5395959173992295496 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.pull] HandleMessage -> DEBU d7d GossipMessage: tag:EMPTY hello:<nonce:5395959173992295496 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d80 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d81 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d82 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.pull] SendDigest -> DEBU d84 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d85 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d86 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d87 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d88 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU d89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d8a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [msp] DeserializeIdentity -> DEBU d8b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:47.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs"
orderer0.example.com | "2019-05-02 09:27:48.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.5µs "
orderer0.example.com | "2019-05-02 09:27:48.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 2 on channel businesschannel took 49.2µs"
orderer0.example.com | "2019-05-02 09:27:48.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs"
orderer0.example.com | "2019-05-02 09:27:48.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs "
orderer0.example.com | "2019-05-02 09:27:48.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4521ms "
orderer0.example.com | "2019-05-02 09:27:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs"
orderer0.example.com | "2019-05-02 09:27:48.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.2µs "
orderer0.example.com | "2019-05-02 09:27:48.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs"
orderer0.example.com | "2019-05-02 09:27:48.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs"
orderer0.example.com | "2019-05-02 09:27:48.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.4µs "
orderer0.example.com | "2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.4µs "
orderer0.example.com | "2019-05-02 09:27:48.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU eeb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eec Sending msg of 28 bytes to 3 on channel testchainid took 754.8µs"
orderer0.example.com | "2019-05-02 09:27:49.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs "
orderer0.example.com | "2019-05-02 09:27:49.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs"
orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs"
orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.8µs "
orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs "
orderer0.example.com | "2019-05-02 09:27:49.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs"
orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs "
orderer0.example.com | "2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ef7 Batch timer expired, creating block" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] propose -> INFO ef8 Created block [8], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:49.781 UTC [orderer.consensus.etcdraft] 2 -> DEBU ef9 Proposed block [8] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 3170 bytes to 2 on channel businesschannel took 29.5µs"
orderer0.example.com | "2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 3170 bytes to 3 on channel businesschannel took 17.3µs"
orderer0.example.com | "2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 79µs "
orderer0.example.com | "2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 265.5µs "
orderer0.example.com | "2019-05-02 09:27:49.790 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d92 0xc002e58630 gate 1556789248982502500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d93 0xc002e58630 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d94 0xc002e58630 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d95 0xc002e58630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d96 0xc002e58630 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d97 0xc002e58630 gate 1556789248982502500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d9b 0xc002e58e70 gate 1556789248982885700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9c 0xc002e58e70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9d 0xc002e58e70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU d9e 0xc002e58e70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU d9f Verify: digest = 00000000 19 46 e5 90 dc 7f 40 95 cb 72 1f 3c 26 75 f6 60 |.F....@..r.<&u.`|
peer0.org1.example.com | 00000010 00 a1 a9 b6 fd 31 32 4d 4b 83 4b f7 b4 46 fc c5 |.....12MK.K..F..|"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU da0 Verify: sig = 00000000 30 44 02 20 2d 8b be 90 15 09 01 ee e8 04 0d 69 |0D. -..........i|
peer0.org1.example.com | 00000010 fe 09 69 d2 61 5c 3e 1a 1c 5a 21 6a 08 fc db ff |..i.a\>..Z!j....|
peer0.org1.example.com | 00000020 02 a1 fd 48 02 20 6a 97 93 fe 9c b3 ab 87 e6 e6 |...H. j.........|
peer0.org1.example.com | 00000030 19 16 b4 82 eb 29 1e e6 4f ad 1a 6a f6 cf d9 b5 |.....)..O..j....|
peer0.org1.example.com | 00000040 b9 ae 06 2f 1a ae |.../..|"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU da1 0xc002e58e70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func1 -> DEBU da2 0xc002e58e70 gate 1556789248982885700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU da7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU daa Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dab Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dac Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU dad Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU dae Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU daf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.gossip] ValidateAliveMsg -> DEBU db0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [msp] DeserializeIdentity -> DEBU db1 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:49.790 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs"
orderer0.example.com | "2019-05-02 09:27:49.791 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs"
orderer0.example.com | "2019-05-02 09:27:49.791 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs "
orderer0.example.com | "2019-05-02 09:27:49.792 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f02 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:27:49.792 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f03 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2"
orderer0.example.com | "2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f04 Sign: plaintext: 0A020802120B0A090A03010203100418...514B52B5CEA2B0457AF4595D7D94A4BF "
orderer0.example.com | "2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f05 Sign: digest: 45CDD9EC16838AE18F87E5441ED922AFDC76B0374E84CAD29B729FE2FE40C24E "
orderer0.example.com | "2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs "
orderer0.example.com | "2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.798 UTC [fsblkstorage] indexBlock -> DEBU f08 Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets=
orderer0.example.com | txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:27:49.801 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.804 UTC [fsblkstorage] updateCheckpoint -> DEBU f0a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98665], isChainEmpty=[false], lastBlockNumber=[8]"
orderer0.example.com | "2019-05-02 09:27:49.805 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f0b [channel: businesschannel] Wrote block [8]"
orderer0.example.com | "2019-05-02 09:27:49.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs"
orderer0.example.com | "2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs"
orderer0.example.com | "2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs "
orderer0.example.com | "2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 787.1µs "
orderer0.example.com | "2019-05-02 09:27:49.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:49.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs"
orderer0.example.com | "2019-05-02 09:27:50.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920.9µs "
orderer0.example.com | "2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs"
orderer0.example.com | "2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 27µs"
orderer0.example.com | "2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.9µs "
orderer0.example.com | "2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs "
orderer0.example.com | "2019-05-02 09:27:50.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs"
orderer0.example.com | "2019-05-02 09:27:50.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5813ms "
orderer0.example.com | "2019-05-02 09:27:50.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs"
orderer0.example.com | "2019-05-02 09:27:50.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs"
orderer0.example.com | "2019-05-02 09:27:50.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.7µs "
orderer0.example.com | "2019-05-02 09:27:50.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f22 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:50.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func1 -> DEBU db8 0xc002e8f1a0 gate 1556789248984776100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU db9 0xc002e8f1a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliverevents] DeliverFiltered -> DEBU dba Starting new DeliverFiltered handler"
peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbb Starting new deliver loop for 172.18.0.8:57288"
peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbc Attempting to read seek info message from 172.18.0.8:57288"
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbd acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock"
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbe acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [cauthdsl] func1 -> DEBU dc2 0xc002cdb5d0 gate 1556789248986928000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc3 0xc002cdb5d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc4 0xc002cdb5d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU dc5 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] Validate -> DEBU dc6 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] getCertificationChain -> DEBU dc7 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dc8 0xc002cdb5d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dc9 Verify: digest = 00000000 e2 18 1f 42 c4 7c d6 61 4c 45 4b 09 23 ae 1c bc |...B.|.aLEK.#...|
peer0.org1.example.com | 00000010 72 b2 ea 02 59 1f 65 2c 98 c2 d7 38 ea 8c 99 20 |r...Y.e,...8... |"
peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dca Verify: sig = 00000000 30 45 02 21 00 df 8b 16 53 3b 96 ed 61 32 25 bb |0E.!....S;..a2%.|
peer0.org1.example.com | 00000010 3b 51 f9 eb 1c 95 10 8d 30 51 4e e9 7e a4 03 4a |;Q......0QN.~..J|
peer0.org1.example.com | 00000020 bb c8 52 4f bd 02 20 25 a9 c7 ba bd f1 1b ca c3 |..RO.. %........|
peer0.org1.example.com | 00000030 e5 ab 33 9e 50 3e 62 d6 05 3f 4e 20 03 6f 87 b5 |..3.P>b..?N .o..|
peer0.org1.example.com | 00000040 37 24 4f 9a 29 8f 9f |7$O.)..|"
peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dcb 0xc002cdb5d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func1 -> DEBU dcc 0xc002cdb5d0 gate 1556789248986928000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcd Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [common.deliver] deliverBlocks -> DEBU dd1 [channel: businesschannel] Received seekInfo (0xc002548140) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.8:57288"
peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [fsblkstorage] Next -> DEBU dd2 Initializing block stream for iterator. itr.maxBlockNumAvailable=2"
peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] newBlockfileStream -> DEBU dd3 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]"
peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd4 Remaining bytes=[23746], Going to peek [8] bytes"
peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd5 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}"
peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd6 blockbytes [23743] read from file [0]"
peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [common.deliver] deliverBlocks -> DEBU dd7 [channel: businesschannel] Delivering block [2] for (0xc002548140) for 172.18.0.8:57288"
peer0.org1.example.com | "2019-05-02 09:27:28.991 UTC [fsblkstorage] waitForBlock -> DEBU dd8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]"
peer0.org1.example.com | "2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU dde Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:50.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.997ms "
orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 24µs"
orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs "
orderer0.example.com | "2019-05-02 09:27:51.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 86.5µs"
orderer0.example.com | "2019-05-02 09:27:51.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.1044ms "
orderer0.example.com | "2019-05-02 09:27:51.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:51.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs "
orderer0.example.com | "2019-05-02 09:27:51.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:51.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 3 on channel businesschannel took 116.5µs"
orderer0.example.com | "2019-05-02 09:27:51.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:51.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs "
orderer0.example.com | "2019-05-02 09:27:51.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 3 on channel testchainid took 174.8µs"
orderer0.example.com | "2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs"
orderer0.example.com | "2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs"
orderer0.example.com | "2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.2µs "
orderer0.example.com | "2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs "
orderer0.example.com | "2019-05-02 09:27:51.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:51.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs"
orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs "
orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs"
orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 2 on channel businesschannel took 8.3µs"
orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 423µs "
orderer0.example.com | "2019-05-02 09:27:52.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs "
orderer0.example.com | "2019-05-02 09:27:52.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.488 UTC [orderer.common.server] Deliver -> DEBU f40 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f41 Starting new deliver loop for 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f42 Attempting to read seek info message from 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.490 UTC [msp] DeserializeIdentity -> DEBU f48 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:52.491 UTC [msp.identity] newIdentity -> DEBU f49 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU ddf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU de2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] Send -> DEBU de8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU dea Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU deb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.pull] Hello -> DEBU ded Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dee Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU def Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.comm] Send -> DEBU df0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8492395987397891600 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.comm] sendToEndpoint -> DEBU df1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8492395987397891600 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU de5 0xc002e8f1a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU df9 0xc002e8f1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU dfa 0xc002e8f1a0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dfb 0xc002e8f1a0 gate 1556789248984776100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dff 0xc002ee18e0 gate 1556789249006327800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e00 0xc002ee18e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e01 0xc002ee18e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e02 0xc002ee18e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e03 Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.|
peer0.org1.example.com | 00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e04 Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........|
peer0.org1.example.com | 00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'|
peer0.org1.example.com | 00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........|
peer0.org1.example.com | 00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.|
peer0.org1.example.com | 00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e05 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e06 0xc002ee18e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU e07 0xc002ee18e0 gate 1556789249006327800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0b Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.491 UTC [cauthdsl] func1 -> DEBU f4a 0xc000c5d630 gate 1556789272491766100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4b 0xc000c5d630 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4c 0xc000c5d630 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4d 0xc000c5d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4e 0xc000c5d630 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.494 UTC [cauthdsl] func1 -> DEBU f4f 0xc000c5d630 gate 1556789272491766100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func1 -> DEBU f53 0xc000b88770 gate 1556789272495359700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f54 0xc000b88770 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f55 0xc000b88770 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f56 0xc000b88770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f57 0xc000b88770 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func1 -> DEBU f58 0xc000b88770 gate 1556789272495359700 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f59 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.498 UTC [policies] func1 -> DEBU f5b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5c Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func1 -> DEBU f61 0xc000b89480 gate 1556789272500902900 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f62 0xc000b89480 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f63 0xc000b89480 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.501 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU f64 Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:52.501 UTC [msp] Validate -> DEBU f65 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:52.502 UTC [cauthdsl] func2 -> DEBU f66 0xc000b89480 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f67 Verify: digest = 00000000 aa 2a aa ac 5f 58 db 10 7a 6b fc 41 0c a7 56 fb |.*.._X..zk.A..V.|
orderer0.example.com | 00000010 c6 ae 5c cc 06 8c 4d 21 df 90 b4 b1 59 5b 03 64 |..\...M!....Y[.d|"
orderer0.example.com | "2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f68 Verify: sig = 00000000 30 44 02 20 56 3e 60 41 52 6c e3 38 cc 81 e4 fc |0D. V>`ARl.8....|
orderer0.example.com | 00000010 6b 85 79 6f e2 ea df f2 38 5e 44 22 6b cc ca 09 |k.yo....8^D"k...|
orderer0.example.com | 00000020 e3 a3 09 6e 02 20 7a 91 90 c9 79 b5 e7 1b 0e 15 |...n. z...y.....|
orderer0.example.com | 00000030 88 bf c1 4e 3f da 66 b6 7c 82 16 4a d7 fd 08 d8 |...N?.f.|..J....|
orderer0.example.com | 00000040 9d 6e 2f 73 05 68 |.n/s.h|"
orderer0.example.com | "2019-05-02 09:27:52.509 UTC [cauthdsl] func2 -> DEBU f69 0xc000b89480 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:52.509 UTC [cauthdsl] func1 -> DEBU f6a 0xc000b89480 gate 1556789272500902900 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:52.509 UTC [policies] Evaluate -> DEBU f6b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6d Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6f Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:52.512 UTC [common.deliver] deliverBlocks -> DEBU f71 [channel: businesschannel] Received seekInfo (0xc00102bac0) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.513 UTC [fsblkstorage] Next -> DEBU f72 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:52.513 UTC [fsblkstorage] newBlockfileStream -> DEBU f73 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]"
orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f74 Remaining bytes=[4051], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f75 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}"
orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f76 blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:52.515 UTC [common.deliver] deliverBlocks -> DEBU f77 [channel: businesschannel] Delivering block [8] for (0xc00102bac0) for 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.533 UTC [common.deliver] deliverBlocks -> DEBU f78 [channel: businesschannel] Done delivering to 172.18.0.8:57352 for (0xc00102bac0)"
orderer0.example.com | "2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f79 Waiting for new SeekInfo from 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f7a Attempting to read seek info message from 172.18.0.8:57352"
orderer0.example.com | "2019-05-02 09:27:52.538 UTC [common.deliver] Handle -> WARN f7b Error reading from 172.18.0.8:57352: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:52.538 UTC [orderer.common.server] func1 -> DEBU f7c Closing Deliver stream"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.discovery] handleAliveMessage -> DEBU e0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e0a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.discovery] learnExistingMembers -> DEBU e0e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e0f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 "
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e10 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 "
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e11 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e12 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] handleAliveMessage -> DEBU e13 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU e14 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e16 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e17 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e19 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] Send -> DEBU e1b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e1c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.008 UTC [gossip.gossip] handleMessage -> DEBU e20 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.012 UTC [gossip.comm] func1 -> DEBU e21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.009 UTC [gossip.gossip] handleMessage -> DEBU e22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e23 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e24 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU e26 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e27 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e28 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e29 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e2a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4316415630670511941 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.comm] func1 -> DEBU e2b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.pull] HandleMessage -> DEBU e2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4316415630670511941 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.pull] SendDigest -> DEBU e2d Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e30 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e31 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.021 UTC [msp] DeserializeIdentity -> DEBU e32 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:52.538 UTC [comm.grpc.server] 1 -> INFO f7d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57352 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.4727ms
orderer0.example.com | "2019-05-02 09:27:52.539 UTC [grpc] infof -> DEBU f7e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:52.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs"
orderer0.example.com | "2019-05-02 09:27:52.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 715.1µs "
orderer0.example.com | "2019-05-02 09:27:52.746 UTC [orderer.common.server] Deliver -> DEBU f82 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f83 Starting new deliver loop for 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f84 Attempting to read seek info message from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.754 UTC [policies] Evaluate -> DEBU f88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.755 UTC [policies] Evaluate -> DEBU f89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.756 UTC [cauthdsl] func1 -> DEBU f8a 0xc000b937b0 gate 1556789272756392300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8b 0xc000b937b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8c 0xc000b937b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8d 0xc000b937b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8e 0xc000b937b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.759 UTC [cauthdsl] func1 -> DEBU f8f 0xc000b937b0 gate 1556789272756392300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.761 UTC [policies] Evaluate -> DEBU f92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.761 UTC [cauthdsl] func1 -> DEBU f93 0xc000b93ff0 gate 1556789272761807700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.763 UTC [cauthdsl] func2 -> DEBU f94 0xc000b93ff0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.765 UTC [cauthdsl] func2 -> DEBU f95 0xc000b93ff0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.767 UTC [cauthdsl] func2 -> DEBU f96 0xc000b93ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.768 UTC [cauthdsl] func2 -> DEBU f97 0xc000b93ff0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.770 UTC [cauthdsl] func1 -> DEBU f98 0xc000b93ff0 gate 1556789272761807700 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.774 UTC [policies] Evaluate -> DEBU f99 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.775 UTC [policies] Evaluate -> DEBU f9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.776 UTC [policies] func1 -> DEBU f9b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU f9c Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU f9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU fa0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.779 UTC [cauthdsl] func1 -> DEBU fa1 0xc0008aece0 gate 1556789272779495000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.779 UTC [cauthdsl] func2 -> DEBU fa2 0xc0008aece0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.780 UTC [cauthdsl] func2 -> DEBU fa3 0xc0008aece0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU fa4 0xc0008aece0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa5 Verify: digest = 00000000 51 b5 59 49 8e 88 d2 29 bb 35 a7 3a cb 1a cd 85 |Q.YI...).5.:....|
orderer0.example.com | 00000010 63 9b 8d 93 72 30 ef c3 a6 7c 09 ce 62 06 95 9b |c...r0...|..b...|"
orderer0.example.com | "2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa6 Verify: sig = 00000000 30 44 02 20 7f 7c 8d 61 da 00 c4 15 7c e1 1e 8b |0D. .|.a....|...|
orderer0.example.com | 00000010 2e f1 c8 8a 9a 56 aa b5 bd 74 56 b9 40 96 a7 ba |.....V...tV.@...|
orderer0.example.com | 00000020 0f ba f2 6c 02 20 50 97 b2 2d 85 a0 f5 b7 ca 97 |...l. P..-......|
orderer0.example.com | 00000030 77 42 f7 33 5e 86 61 14 70 1e 47 76 51 d2 ef 68 |wB.3^.a.p.GvQ..h|
orderer0.example.com | 00000040 0a 49 7e 6f af c6 |.I~o..|"
orderer0.example.com | "2019-05-02 09:27:52.792 UTC [cauthdsl] func2 -> DEBU fa7 0xc0008aece0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:52.792 UTC [cauthdsl] func1 -> DEBU fa8 0xc0008aece0 gate 1556789272779495000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU fa9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU faa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.795 UTC [policies] Evaluate -> DEBU fab Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fad Signature set satisfies policy /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e34 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e35 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [policies] Evaluate -> DEBU e36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e39 0xc002f277c0 gate 1556789249024280700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3a 0xc002f277c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3b 0xc002f277c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3c 0xc002f277c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3d 0xc002f277c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e3e 0xc002f277c0 gate 1556789249024280700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e3f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e42 0xc002f84000 gate 1556789249025055600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e43 0xc002f84000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e44 0xc002f84000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e45 0xc002f84000 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e46 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e47 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e48 0xc002f84000 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e49 0xc002f84000 gate 1556789249025055600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:29.034 UTC [msp] DeserializeIdentity -> DEBU e52 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.034 UTC [msp] DeserializeIdentity -> DEBU e53 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.034 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e55 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e56 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [cauthdsl] func1 -> DEBU e5a 0xc00301a6a0 gate 1556789249035901200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5b 0xc00301a6a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5c 0xc00301a6a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5d 0xc00301a6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5e 0xc00301a6a0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e5f 0xc00301a6a0 gate 1556789249035901200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e60 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e63 0xc00301aee0 gate 1556789249036422100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e64 0xc00301aee0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e65 0xc00301aee0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e66 0xc00301aee0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e67 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e68 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e69 0xc00301aee0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e6a 0xc00301aee0 gate 1556789249036422100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [gossip.gossip] handleMessage -> DEBU e6f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e70 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.pull] HandleMessage -> DEBU e71 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes"
orderer0.example.com | "2019-05-02 09:27:52.797 UTC [policies] Evaluate -> DEBU fae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:52.797 UTC [common.deliver] deliverBlocks -> DEBU faf [channel: businesschannel] Received seekInfo (0xc0010ce040) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.797 UTC [fsblkstorage] Next -> DEBU fb0 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:52.798 UTC [fsblkstorage] newBlockfileStream -> DEBU fb1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]"
orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb2 Remaining bytes=[4051], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb3 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}"
orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb4 blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:52.799 UTC [common.deliver] deliverBlocks -> DEBU fb5 [channel: businesschannel] Delivering block [8] for (0xc0010ce040) for 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.800 UTC [common.deliver] deliverBlocks -> DEBU fb6 [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce040)"
orderer0.example.com | "2019-05-02 09:27:52.800 UTC [common.deliver] Handle -> DEBU fb7 Waiting for new SeekInfo from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.801 UTC [common.deliver] Handle -> DEBU fb8 Attempting to read seek info message from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fbb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.803 UTC [cauthdsl] func1 -> DEBU fbe 0xc0008c48a0 gate 1556789272803415100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.803 UTC [cauthdsl] func2 -> DEBU fbf 0xc0008c48a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc0 0xc0008c48a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc1 0xc0008c48a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc2 0xc0008c48a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func1 -> DEBU fc3 0xc0008c48a0 gate 1556789272803415100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.805 UTC [cauthdsl] func1 -> DEBU fc7 0xc0008c50e0 gate 1556789272805692300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc8 0xc0008c50e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc9 0xc0008c50e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fca 0xc0008c50e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [cauthdsl] func2 -> DEBU fcb 0xc0008c50e0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [cauthdsl] func1 -> DEBU fcc 0xc0008c50e0 gate 1556789272805692300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fcd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] func1 -> DEBU fcf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fd0 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:52.808 UTC [cauthdsl] func1 -> DEBU fd5 0xc0008c5dd0 gate 1556789272808840200 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd6 0xc0008c5dd0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd7 0xc0008c5dd0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd8 0xc0008c5dd0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:52.809 UTC [msp.identity] Verify -> DEBU fd9 Verify: digest = 00000000 b3 8e c3 82 c2 85 96 25 36 01 25 77 f2 f7 6c aa |.......%6.%w..l.|
orderer0.example.com | 00000010 1d 66 b9 19 a2 e5 14 11 b0 fa 32 48 71 83 5e b1 |.f........2Hq.^.|"
orderer0.example.com | "2019-05-02 09:27:52.810 UTC [msp.identity] Verify -> DEBU fda Verify: sig = 00000000 30 44 02 20 1b d7 ab bd 8b 3a 80 39 6f c7 b9 1c |0D. .....:.9o...|
orderer0.example.com | 00000010 7a 29 f1 10 d3 81 06 56 5c 0a 1a 42 62 d5 17 a3 |z).....V\..Bb...|
orderer0.example.com | 00000020 ef de b2 4c 02 20 37 49 8c ac a6 12 e1 46 7f 03 |...L. 7I.....F..|
orderer0.example.com | 00000030 cb f4 65 3b 55 18 c7 78 3b 21 ab d2 a6 96 e9 bc |..e;U..x;!......|
orderer0.example.com | 00000040 ef a5 0b eb c8 b7 |......|"
orderer0.example.com | "2019-05-02 09:27:52.811 UTC [cauthdsl] func2 -> DEBU fdb 0xc0008c5dd0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:52.811 UTC [cauthdsl] func1 -> DEBU fdc 0xc0008c5dd0 gate 1556789272808840200 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fde == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdf Signature set satisfies policy /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e72 Exiting"
orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe1 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:52.817 UTC [common.deliver] deliverBlocks -> DEBU fe3 [channel: businesschannel] Received seekInfo (0xc0010ce500) start:<specified:<number:2 > > stop:<specified:<number:2 > > from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.819 UTC [fsblkstorage] Next -> DEBU fe4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:52.826 UTC [fsblkstorage] newBlockfileStream -> DEBU fe5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]"
orderer0.example.com | "2019-05-02 09:27:52.827 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe6 Remaining bytes=[51040], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}"
orderer0.example.com | "2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe8 blockbytes [23742] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:52.832 UTC [common.deliver] deliverBlocks -> DEBU fe9 [channel: businesschannel] Delivering block [2] for (0xc0010ce500) for 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.852 UTC [common.deliver] deliverBlocks -> DEBU fea [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce500)"
orderer0.example.com | "2019-05-02 09:27:52.853 UTC [common.deliver] Handle -> DEBU feb Waiting for new SeekInfo from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.854 UTC [common.deliver] Handle -> DEBU fec Attempting to read seek info message from 172.18.0.8:57354"
orderer0.example.com | "2019-05-02 09:27:52.865 UTC [grpc] infof -> DEBU fed transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:52.864 UTC [common.deliver] Handle -> WARN fee Error reading from 172.18.0.8:57354: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:52.870 UTC [orderer.common.server] func1 -> DEBU fef Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:52.872 UTC [comm.grpc.server] 1 -> INFO ff0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57354 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=126.0907ms
orderer0.example.com | "2019-05-02 09:27:52.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff1 Sending msg of 28 bytes to 2 on channel businesschannel took 91.8µs"
orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.7µs"
orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs "
orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 886µs "
orderer0.example.com | "2019-05-02 09:27:52.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:52.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.043 UTC [orderer.common.server] Deliver -> DEBU ff7 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff8 Starting new deliver loop for 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff9 Attempting to read seek info message from 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func1 -> DEBU fff 0xc000f34a30 gate 1556789273046087700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1000 0xc000f34a30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1001 0xc000f34a30 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1002 0xc000f34a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1003 0xc000f34a30 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.047 UTC [cauthdsl] func1 -> DEBU 1004 0xc000f34a30 gate 1556789273046087700 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1005 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1006 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1007 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func1 -> DEBU 1008 0xc000f35270 gate 1556789273048284900 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 1009 0xc000f35270 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100a 0xc000f35270 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100b 0xc000f35270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.049 UTC [cauthdsl] func2 -> DEBU 100c 0xc000f35270 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.049 UTC [cauthdsl] func1 -> DEBU 100d 0xc000f35270 gate 1556789273048284900 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] func1 -> DEBU 1010 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1011 Signature set did not satisfy policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e73 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e74 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e75 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e76 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e77 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e78 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e79 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func1 -> DEBU e80 0xc003109c10 gate 1556789249039153200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e81 0xc003109c10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e82 0xc003109c10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e83 0xc003109c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e84 0xc003109c10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func1 -> DEBU e85 0xc003109c10 gate 1556789249039153200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e86 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.042 UTC [cauthdsl] func1 -> DEBU e89 0xc0031c24e0 gate 1556789249042060500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.042 UTC [cauthdsl] func2 -> DEBU e8a 0xc0031c24e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8b 0xc0031c24e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8c 0xc0031c24e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8d Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8e Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8f 0xc0031c24e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func1 -> DEBU e90 0xc0031c24e0 gate 1556789249042060500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [policies] Evaluate -> DEBU e91 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e93 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e95 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e96 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e97 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e98 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e99 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea0 0xc0032b4000 gate 1556789249044708600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea1 0xc0032b4000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea2 0xc0032b4000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea3 0xc0032b4000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea4 0xc0032b4000 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea5 0xc0032b4000 gate 1556789249044708600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [policies] Evaluate -> DEBU ea8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func1 -> DEBU ea9 0xc0032b4870 gate 1556789249045052000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eaa 0xc0032b4870 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eab 0xc0032b4870 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eac 0xc0032b4870 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU ead Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU eae Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [cauthdsl] func2 -> DEBU eaf 0xc0032b4870 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [cauthdsl] func1 -> DEBU eb0 0xc0032b4870 gate 1556789249045052000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1012 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1013 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1014 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.051 UTC [policies] Evaluate -> DEBU 1015 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func1 -> DEBU 1016 0xc000f35f60 gate 1556789273051402800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1017 0xc000f35f60 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1018 0xc000f35f60 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.052 UTC [cauthdsl] func2 -> DEBU 1019 0xc000f35f60 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101a Verify: digest = 00000000 05 ae 83 a4 44 52 d3 78 63 72 e7 59 a1 ab 53 39 |....DR.xcr.Y..S9|
orderer0.example.com | 00000010 94 48 e0 b9 cd be 47 25 75 b7 70 be ae af 93 8c |.H....G%u.p.....|"
orderer0.example.com | "2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101b Verify: sig = 00000000 30 45 02 21 00 e6 af 39 14 fe c2 7e 6f 26 79 e8 |0E.!...9...~o&y.|
orderer0.example.com | 00000010 7b 15 37 29 fd 0f ac ac eb a8 2f ef e5 9c 3c 66 |{.7)....../...<f|
orderer0.example.com | 00000020 a7 1c a9 6c e6 02 20 47 c6 7f 1b b3 47 50 ae bd |...l.. G....GP..|
orderer0.example.com | 00000030 c5 2c 02 ed 0f 93 2d df 64 1c 73 56 c3 dc 14 60 |.,....-.d.sV...`|
orderer0.example.com | 00000040 e3 78 a1 2f 12 d5 22 |.x./.."|"
orderer0.example.com | "2019-05-02 09:27:53.053 UTC [cauthdsl] func2 -> DEBU 101c 0xc000f35f60 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:53.053 UTC [cauthdsl] func1 -> DEBU 101d 0xc000f35f60 gate 1556789273051402800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:53.053 UTC [policies] Evaluate -> DEBU 101e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 101f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1020 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1021 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1022 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.055 UTC [policies] Evaluate -> DEBU 1023 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.055 UTC [common.deliver] deliverBlocks -> DEBU 1024 [channel: businesschannel] Received seekInfo (0xc0010566c0) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] Next -> DEBU 1025 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] newBlockfileStream -> DEBU 1026 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1027 Remaining bytes=[98665], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1028 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:53.057 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1029 blockbytes [23935] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:53.057 UTC [common.deliver] deliverBlocks -> DEBU 102a [channel: businesschannel] Delivering block [0] for (0xc0010566c0) for 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] deliverBlocks -> DEBU 102b [channel: businesschannel] Done delivering to 172.18.0.8:57356 for (0xc0010566c0)"
orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102c Waiting for new SeekInfo from 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102d Attempting to read seek info message from 172.18.0.8:57356"
orderer0.example.com | "2019-05-02 09:27:53.068 UTC [common.deliver] Handle -> WARN 102e Error reading from 172.18.0.8:57356: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:53.068 UTC [orderer.common.server] func1 -> DEBU 102f Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:53.068 UTC [comm.grpc.server] 1 -> INFO 1030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57356 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.705ms
orderer0.example.com | "2019-05-02 09:27:53.068 UTC [grpc] infof -> DEBU 1031 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:53.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1033 Sending msg of 28 bytes to 3 on channel testchainid took 165.5µs"
orderer0.example.com | "2019-05-02 09:27:53.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs "
orderer0.example.com | "2019-05-02 09:27:53.392 UTC [orderer.common.server] Deliver -> DEBU 1035 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1036 Starting new deliver loop for 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1037 Attempting to read seek info message from 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1038 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1039 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 103a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func1 -> DEBU 103d 0xc000fd9ca0 gate 1556789273396195300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103e 0xc000fd9ca0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103f 0xc000fd9ca0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.397 UTC [cauthdsl] func2 -> DEBU 1040 0xc000fd9ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.398 UTC [cauthdsl] func2 -> DEBU 1041 0xc000fd9ca0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb5 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb6 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU eb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU eba Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ebb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ebf 0xc0032f4a10 gate 1556789249048050500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec0 0xc0032f4a10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec1 0xc0032f4a10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec2 0xc0032f4a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec3 0xc0032f4a10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec4 0xc0032f4a10 gate 1556789249048050500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec8 0xc0032f5260 gate 1556789249048554900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec9 0xc0032f5260 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU eca 0xc0032f5260 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ecb 0xc0032f5260 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecc Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecd Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
orderer0.example.com | "2019-05-02 09:27:53.398 UTC [cauthdsl] func1 -> DEBU 1042 0xc000fd9ca0 gate 1556789273396195300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1043 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1044 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func1 -> DEBU 1046 0xc000d0a4e0 gate 1556789273400020500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1047 0xc000d0a4e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1048 0xc000d0a4e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 1049 0xc000d0a4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 104a 0xc000d0a4e0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.402 UTC [cauthdsl] func1 -> DEBU 104b 0xc000d0a4e0 gate 1556789273400020500 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.403 UTC [policies] func1 -> DEBU 104e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:53.403 UTC [policies] Evaluate -> DEBU 104f Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1050 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.405 UTC [policies] Evaluate -> DEBU 1053 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.405 UTC [cauthdsl] func1 -> DEBU 1054 0xc000d0b1d0 gate 1556789273405590800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.405 UTC [cauthdsl] func2 -> DEBU 1055 0xc000d0b1d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1056 0xc000d0b1d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1057 0xc000d0b1d0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1058 Verify: digest = 00000000 1c f0 80 02 d2 b9 a0 65 98 ce c4 1b 06 23 58 11 |.......e.....#X.|
orderer0.example.com | 00000010 e0 4e ed 3e 58 bb 81 f7 52 8f 0f fb e5 c8 69 b8 |.N.>X...R.....i.|"
orderer0.example.com | "2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1059 Verify: sig = 00000000 30 44 02 20 74 de 2d 01 56 d5 d9 7c 3e e9 40 46 |0D. t.-.V..|>.@F|
orderer0.example.com | 00000010 8e db 34 ce 86 bc 54 ef cb 3b 92 25 c0 41 a1 3e |..4...T..;.%.A.>|
orderer0.example.com | 00000020 4d ed 6b 49 02 20 58 91 f9 da 3b 83 16 6a db 0a |M.kI. X...;..j..|
orderer0.example.com | 00000030 37 03 18 f9 16 27 f8 85 62 e2 9f 98 8e 3a d3 53 |7....'..b....:.S|
orderer0.example.com | 00000040 fd fd f6 41 ad a6 |...A..|"
orderer0.example.com | "2019-05-02 09:27:53.408 UTC [cauthdsl] func2 -> DEBU 105a 0xc000d0b1d0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:53.408 UTC [cauthdsl] func1 -> DEBU 105b 0xc000d0b1d0 gate 1556789273405590800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105e Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1060 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.411 UTC [common.deliver] deliverBlocks -> DEBU 1062 [channel: businesschannel] Received seekInfo (0xc0010cf4c0) start:<specified:<number:1 > > stop:<specified:<number:1 > > from 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.412 UTC [fsblkstorage] Next -> DEBU 1063 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:53.412 UTC [fsblkstorage] newBlockfileStream -> DEBU 1064 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]"
orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1065 Remaining bytes=[74727], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1066 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}"
orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1067 blockbytes [23684] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1068 [channel: businesschannel] Delivering block [1] for (0xc0010cf4c0) for 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1069 [channel: businesschannel] Done delivering to 172.18.0.8:57358 for (0xc0010cf4c0)"
orderer0.example.com | "2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106a Waiting for new SeekInfo from 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106b Attempting to read seek info message from 172.18.0.8:57358"
orderer0.example.com | "2019-05-02 09:27:53.425 UTC [common.deliver] Handle -> WARN 106c Error reading from 172.18.0.8:57358: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:53.425 UTC [orderer.common.server] func1 -> DEBU 106e Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:53.425 UTC [comm.grpc.server] 1 -> INFO 106f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57358 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5595ms
orderer0.example.com | "2019-05-02 09:27:53.425 UTC [grpc] infof -> DEBU 106d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:53.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs"
orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1071 Sending msg of 28 bytes to 3 on channel businesschannel took 165µs"
orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1072 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs "
orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs "
orderer0.example.com | "2019-05-02 09:27:53.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1074 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.620 UTC [orderer.common.server] Deliver -> DEBU 1076 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1077 Starting new deliver loop for 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1078 Attempting to read seek info message from 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 1079 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.622 UTC [policies] Evaluate -> DEBU 107d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func1 -> DEBU 107e 0xc000d08eb0 gate 1556789273623226800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 107f 0xc000d08eb0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 1080 0xc000d08eb0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1081 0xc000d08eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1082 0xc000d08eb0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.625 UTC [cauthdsl] func1 -> DEBU 1083 0xc000d08eb0 gate 1556789273623226800 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.625 UTC [policies] Evaluate -> DEBU 1084 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1085 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.626 UTC [cauthdsl] func1 -> DEBU 1087 0xc000d096f0 gate 1556789273626795400 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1088 0xc000d096f0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1089 0xc000d096f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 108a 0xc000d096f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.628 UTC [cauthdsl] func2 -> DEBU 108b 0xc000d096f0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.629 UTC [cauthdsl] func1 -> DEBU 108c 0xc000d096f0 gate 1556789273626795400 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.631 UTC [policies] func1 -> DEBU 108f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:53.631 UTC [policies] Evaluate -> DEBU 1090 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1091 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1092 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1093 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1094 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.634 UTC [cauthdsl] func1 -> DEBU 1095 0xc0011dc3e0 gate 1556789273634532000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1096 0xc0011dc3e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1097 0xc0011dc3e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.636 UTC [cauthdsl] func2 -> DEBU 1098 0xc0011dc3e0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:53.636 UTC [msp.identity] Verify -> DEBU 1099 Verify: digest = 00000000 bb a9 95 be 70 7e b2 2c 1c 35 98 4d 7c 9f fd 22 |....p~.,.5.M|.."|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
orderer0.example.com | 00000010 4f 67 6f 27 ca cd 6b 62 12 c8 0d 84 4b a0 63 83 |Ogo'..kb....K.c.|"
peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ece 0xc0032f5260 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:53.637 UTC [msp.identity] Verify -> DEBU 109a Verify: sig = 00000000 30 45 02 21 00 b8 53 bc c1 d6 05 f0 ac a1 07 e4 |0E.!..S.........|
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [cauthdsl] func1 -> DEBU ecf 0xc0032f5260 gate 1556789249048554900 evaluation succeeds"
orderer0.example.com | 00000010 2b 82 23 7f 00 39 71 d1 e2 3b 90 fd 0b 15 8d 4f |+.#..9q..;.....O|
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | 00000020 5a 7c 13 89 5a 02 20 6d c0 0c 50 ae 8e c1 6e 78 |Z|..Z. m..P...nx|
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | 00000030 d4 8f 75 f3 5e 0e 01 ba 71 30 60 77 26 28 d9 32 |..u.^...q0`w&(.2|
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed2 Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | 00000040 92 13 f4 88 3f d9 7d |....?.}|"
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.638 UTC [cauthdsl] func2 -> DEBU 109b 0xc0011dc3e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed4 Exiting"
orderer0.example.com | "2019-05-02 09:27:53.638 UTC [cauthdsl] func1 -> DEBU 109c 0xc0011dc3e0 gate 1556789273634532000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
orderer0.example.com | "2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed6 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 109f Signature set satisfies policy /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.051 UTC [msp] DeserializeIdentity -> DEBU ed8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.051 UTC [gossip.gossip] handleMessage -> DEBU ed9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU eda Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151012 "
peer0.org1.example.com | "2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU edb Sign: digest: 8BD10C6FF2C774C8C48607744594E8CA643A811FD742E827D44090B22C88A914 "
peer0.org1.example.com | "2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:29.071 UTC [gossip.discovery] periodicalSendAlive -> DEBU ede Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:29.076 UTC [msp] DeserializeIdentity -> DEBU edf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [gossip.comm] Send -> DEBU ee2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.pull] Hello -> DEBU ee6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.080 UTC [gossip.comm] Send -> DEBU eea Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2438078543997422423 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.080 UTC [gossip.pull] Hello -> DEBU eeb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:29.081 UTC [gossip.comm] Send -> DEBU eec Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13070340137394638550 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.081 UTC [gossip.pull] Hello -> DEBU eed Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eee Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151013 "
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eef Sign: digest: 565CA40A80B9A349F8A0EF0879C43063F9BE80BE3F8260A0E5C5F62546CFA5EC "
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp] DeserializeIdentity -> DEBU ef4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [msp] DeserializeIdentity -> DEBU ef6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU efe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2438078543997422423 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU eff Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13070340137394638550 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f01 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.089 UTC [gossip.gossip] handleMessage -> DEBU f02 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.090 UTC [gossip.pull] HandleMessage -> DEBU f03 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.090 UTC [gossip.comm] func1 -> DEBU f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef1 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10861530303439601111 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.096 UTC [gossip.gossip] handleMessage -> DEBU f05 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f06 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f07 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU f08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f09 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10861530303439601111 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.gossip] handleMessage -> DEBU f0a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f0b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f10 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f0d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [msp] DeserializeIdentity -> DEBU f11 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a1 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.640 UTC [common.deliver] deliverBlocks -> DEBU 10a3 [channel: businesschannel] Received seekInfo (0xc001057080) start:<specified:<number:2 > > stop:<specified:<number:2 > > from 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.640 UTC [fsblkstorage] Next -> DEBU 10a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:53.640 UTC [fsblkstorage] newBlockfileStream -> DEBU 10a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]"
orderer0.example.com | "2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a6 Remaining bytes=[51040], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}"
orderer0.example.com | "2019-05-02 09:27:53.642 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a8 blockbytes [23742] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:53.642 UTC [common.deliver] deliverBlocks -> DEBU 10a9 [channel: businesschannel] Delivering block [2] for (0xc001057080) for 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.643 UTC [common.deliver] deliverBlocks -> DEBU 10aa [channel: businesschannel] Done delivering to 172.18.0.8:57360 for (0xc001057080)"
orderer0.example.com | "2019-05-02 09:27:53.644 UTC [common.deliver] Handle -> DEBU 10ab Waiting for new SeekInfo from 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.645 UTC [common.deliver] Handle -> DEBU 10ac Attempting to read seek info message from 172.18.0.8:57360"
orderer0.example.com | "2019-05-02 09:27:53.652 UTC [common.deliver] Handle -> WARN 10ad Error reading from 172.18.0.8:57360: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:53.653 UTC [orderer.common.server] func1 -> DEBU 10ae Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:53.653 UTC [comm.grpc.server] 1 -> INFO 10af streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57360 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9286ms
orderer0.example.com | "2019-05-02 09:27:53.654 UTC [grpc] infof -> DEBU 10b0 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:53.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b2 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs"
orderer0.example.com | "2019-05-02 09:27:53.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.5µs "
orderer0.example.com | "2019-05-02 09:27:53.874 UTC [orderer.common.server] Deliver -> DEBU 10b4 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b5 Starting new deliver loop for 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b6 Attempting to read seek info message from 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.876 UTC [policies] Evaluate -> DEBU 10b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func1 -> DEBU 10bc 0xc00123a900 gate 1556789273878856500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10bd 0xc00123a900 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10be 0xc00123a900 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10bf 0xc00123a900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10c0 0xc00123a900 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.881 UTC [cauthdsl] func1 -> DEBU 10c1 0xc00123a900 gate 1556789273878856500 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.881 UTC [policies] Evaluate -> DEBU 10c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.883 UTC [cauthdsl] func1 -> DEBU 10c5 0xc00123b140 gate 1556789273883168300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c6 0xc00123b140 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c7 0xc00123b140 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c8 0xc00123b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c9 0xc00123b140 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.886 UTC [cauthdsl] func1 -> DEBU 10ca 0xc00123b140 gate 1556789273883168300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:53.886 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] func1 -> DEBU 10cd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10ce Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:53.889 UTC [policies] Evaluate -> DEBU 10d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func1 -> DEBU 10d3 0xc00123be30 gate 1556789273889401700 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d4 0xc00123be30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d5 0xc00123be30 processing identity 0 with bytes of efef60"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f13 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f14 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func1 -> DEBU f18 0xc0033f9a90 gate 1556789249100627400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f19 0xc0033f9a90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1a 0xc0033f9a90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1b 0xc0033f9a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1c 0xc0033f9a90 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f1d 0xc0033f9a90 gate 1556789249100627400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f21 0xc0034283f0 gate 1556789249101682400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f22 0xc0034283f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f23 0xc0034283f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f24 0xc0034283f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f25 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o|
peer0.org1.example.com | 00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f26 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b|
peer0.org1.example.com | 00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..|
peer0.org1.example.com | 00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..|
peer0.org1.example.com | 00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..|
peer0.org1.example.com | 00000040 23 a8 ae ee 39 1f |#...9.|"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f27 0xc0034283f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func1 -> DEBU f28 0xc0034283f0 gate 1556789249101682400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [policies] Evaluate -> DEBU f29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f2f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f30 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c|
peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|"
peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f31 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....|
peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.|
peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....|
peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.|
peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|"
peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] isSentByMe -> DEBU f33 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f34 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f35 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f36 Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.|
peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|"
peer0.org1.example.com | "2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f37 Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X|
peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..|
peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E|
peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`|
peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|"
peer0.org1.example.com | "2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f39 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.pull] HandleMessage -> DEBU f0f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f40 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.111 UTC [msp.identity] Verify -> DEBU f41 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c|
peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|"
peer0.org1.example.com | "2019-05-02 09:27:29.112 UTC [msp.identity] Verify -> DEBU f42 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....|
peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.|
peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....|
peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.|
peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|"
peer0.org1.example.com | "2019-05-02 09:27:29.112 UTC [gossip.comm] func1 -> DEBU f43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f44 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f45 Verify: sig = 00000000 30 45 02 21 00 eb e2 8f e6 e3 18 d1 ac e0 0f ad |0E.!............|
peer0.org1.example.com | 00000010 ce c8 69 0b 21 67 af 38 12 df a6 75 b1 2b 74 1c |..i.!g.8...u.+t.|
peer0.org1.example.com | 00000020 c4 ac 5f 4e e9 02 20 62 77 43 75 9d 1a 47 ba 1a |.._N.. bwCu..G..|
peer0.org1.example.com | 00000030 22 8c 11 2d a4 42 31 2f af 61 3c c1 2a da cc a0 |"..-.B1/.a<.*...|
peer0.org1.example.com | 00000040 18 c2 35 37 b5 09 c0 |..57...|"
peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] isSentByMe -> DEBU f47 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f48 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f49 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.115 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f4b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.|
peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|"
peer0.org1.example.com | "2019-05-02 09:27:29.117 UTC [gossip.gossip] handleMessage -> DEBU f4d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.128 UTC [gossip.gossip] handleMessage -> DEBU f4e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4f Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X|
peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..|
peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E|
peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`|
peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|"
peer0.org1.example.com | "2019-05-02 09:27:29.129 UTC [gossip.discovery] handleAliveMessage -> DEBU f50 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [gossip.discovery] handleAliveMessage -> DEBU f51 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f52 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [msp.identity] Verify -> DEBU f53 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c|
peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|"
peer0.org1.example.com | "2019-05-02 09:27:29.131 UTC [msp.identity] Verify -> DEBU f54 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....|
peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.|
peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....|
peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.|
peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|"
peer0.org1.example.com | "2019-05-02 09:27:29.133 UTC [gossip.comm] func1 -> DEBU f55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.134 UTC [gossip.discovery] handleAliveMessage -> DEBU f56 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.134 UTC [gossip.discovery] isSentByMe -> DEBU f57 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [gossip.discovery] handleAliveMessage -> DEBU f58 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f59 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f5b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func1 -> DEBU f61 0xc0035429b0 gate 1556789249137467600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f62 0xc0035429b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f63 0xc0035429b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f64 0xc0035429b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f65 0xc0035429b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func1 -> DEBU f66 0xc0035429b0 gate 1556789249137467600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [policies] Evaluate -> DEBU f67 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func1 -> DEBU f6a 0xc0035431f0 gate 1556789249139469900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6b 0xc0035431f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6c 0xc0035431f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [cauthdsl] func2 -> DEBU f6d 0xc0035431f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6e Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.|
peer0.org1.example.com | 00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|"
peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6f Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........|
peer0.org1.example.com | 00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'|
peer0.org1.example.com | 00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........|
peer0.org1.example.com | 00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.|
peer0.org1.example.com | 00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [cauthdsl] func2 -> DEBU f70 0xc0035431f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [cauthdsl] func1 -> DEBU f71 0xc0035431f0 gate 1556789249139469900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f72 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f74 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f76 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f77 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU f78 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f7a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7b Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...|
peer0.org1.example.com | 00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7c Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8|
peer0.org1.example.com | 00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W|
peer0.org1.example.com | 00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..|
peer0.org1.example.com | 00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....|
peer0.org1.example.com | 00000040 1d b3 fc 12 76 7b 14 |....v{.|"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] isSentByMe -> DEBU f7d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f7e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f7f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f80 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f81 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f82 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f83 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f84 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:5792386782404232021 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f86 GossipMessage: tag:EMPTY hello:<nonce:5792386782404232021 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] SendDigest -> DEBU f87 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f88 Exiting"
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d6 0xc00123be30 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d7 Verify: digest = 00000000 26 f5 ee 4c 73 57 f9 2b 50 c9 cc 05 d8 7f 68 cf |&..LsW.+P.....h.|
orderer0.example.com | 00000010 f7 b9 a2 03 c3 02 29 de 0c e5 3c 25 e6 45 df 8d |......)...<%.E..|"
orderer0.example.com | "2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d8 Verify: sig = 00000000 30 45 02 21 00 eb c2 3d ad 6d e5 26 ba cf bc 0f |0E.!...=.m.&....|
orderer0.example.com | 00000010 3f 48 d3 6b 32 a7 10 54 bd 5a 6e df 8a 6c 07 93 |?H.k2..T.Zn..l..|
orderer0.example.com | 00000020 aa 8c 17 42 8e 02 20 3f d4 c5 d0 d4 50 63 4f a1 |...B.. ?....PcO.|
orderer0.example.com | 00000030 5d 10 ed 68 7d 5f 76 fb 71 ae 09 33 5b 18 07 23 |]..h}_v.q..3[..#|
orderer0.example.com | 00000040 f5 17 6c 40 a0 12 c7 |..l@...|"
orderer0.example.com | "2019-05-02 09:27:53.891 UTC [cauthdsl] func2 -> DEBU 10d9 0xc00123be30 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:53.891 UTC [cauthdsl] func1 -> DEBU 10da 0xc00123be30 gate 1556789273889401700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:53.891 UTC [policies] Evaluate -> DEBU 10db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dd Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10df Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:53.893 UTC [common.deliver] deliverBlocks -> DEBU 10e1 [channel: businesschannel] Received seekInfo (0xc001057780) start:<specified:<number:3 > > stop:<specified:<number:3 > > from 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.893 UTC [fsblkstorage] Next -> DEBU 10e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:53.894 UTC [fsblkstorage] newBlockfileStream -> DEBU 10e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]"
orderer0.example.com | "2019-05-02 09:27:53.894 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e4 Remaining bytes=[27295], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e5 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}"
orderer0.example.com | "2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e6 blockbytes [4709] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e7 [channel: businesschannel] Delivering block [3] for (0xc001057780) for 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e8 [channel: businesschannel] Done delivering to 172.18.0.8:57362 for (0xc001057780)"
orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10e9 Waiting for new SeekInfo from 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10ea Attempting to read seek info message from 172.18.0.8:57362"
orderer0.example.com | "2019-05-02 09:27:53.905 UTC [common.deliver] Handle -> WARN 10eb Error reading from 172.18.0.8:57362: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:53.905 UTC [orderer.common.server] func1 -> DEBU 10ec Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:53.905 UTC [comm.grpc.server] 1 -> INFO 10ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57362 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.4388ms
orderer0.example.com | "2019-05-02 09:27:53.905 UTC [grpc] infof -> DEBU 10ee transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs"
orderer0.example.com | "2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f0 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs"
orderer0.example.com | "2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.3µs "
orderer0.example.com | "2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 696.8µs "
orderer0.example.com | "2019-05-02 09:27:53.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:53.964 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.152 UTC [orderer.common.server] Deliver -> DEBU 10f5 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:54.153 UTC [common.deliver] Handle -> DEBU 10f6 Starting new deliver loop for 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.154 UTC [common.deliver] Handle -> DEBU 10f7 Attempting to read seek info message from 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10fa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0012886a0 gate 1556789274157192000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10fe 0xc0012886a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0012886a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.158 UTC [cauthdsl] func2 -> DEBU 1100 0xc0012886a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.159 UTC [cauthdsl] func2 -> DEBU 1101 0xc0012886a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.159 UTC [cauthdsl] func1 -> DEBU 1102 0xc0012886a0 gate 1556789274157192000 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.159 UTC [policies] Evaluate -> DEBU 1103 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] handleMessage -> DEBU f89 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f8b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8c Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...|
peer0.org1.example.com | 00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8d Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8|
peer0.org1.example.com | 00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W|
peer0.org1.example.com | 00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..|
peer0.org1.example.com | 00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....|
peer0.org1.example.com | 00000040 1d b3 fc 12 76 7b 14 |....v{.|"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] isSentByMe -> DEBU f8e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f91 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 7a ba 25 f8 10 d2 95 2c 49 e0 f3 79 85 d2 24 6d |z.%....,I..y..$m|
peer0.org1.example.com | 00000010 c5 80 af e6 1d 9b df 95 d0 a4 bc a1 b9 dc 64 b9 |..............d.|"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 44 02 20 26 27 82 df 54 8b f1 2c 3a 10 0e 27 |0D. &'..T..,:..'|
peer0.org1.example.com | 00000010 a5 1e e8 86 69 49 55 c2 53 23 57 45 91 83 09 38 |....iIU.S#WE...8|
peer0.org1.example.com | 00000020 66 ad e7 5f 02 20 04 eb 71 4b 9f 42 ee 83 1b 7f |f.._. ..qK.B....|
peer0.org1.example.com | 00000030 41 dc 6b 05 9b 02 96 5b ee bb 1a 87 96 29 21 38 |A.k....[.....)!8|
peer0.org1.example.com | 00000040 2a 0d c4 2c 77 43 |*..,wC|"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f94 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f96 Verify: sig = 00000000 30 44 02 20 2c f6 d7 53 a0 03 7e af bd 6c 43 3a |0D. ,..S..~..lC:|
peer0.org1.example.com | 00000010 a0 1d 3e 0b 62 93 d8 3a 82 e1 d3 d4 24 3a d8 bd |..>.b..:....$:..|
peer0.org1.example.com | 00000020 77 25 65 53 02 20 29 fa 86 50 fe 12 65 05 c6 3a |w%eS. )..P..e..:|
peer0.org1.example.com | 00000030 b3 19 38 31 8e 59 c6 3c c9 b3 9b a0 62 ff fc 76 |..81.Y.<....b..v|
peer0.org1.example.com | 00000040 5e ac ea 81 ec db |^.....|"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f95 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f98 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f99 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 "
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 "
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f9e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU f9f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.gossip] handleMessage -> DEBU fa2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
orderer0.example.com | "2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1104 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1105 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func1 -> DEBU 1106 0xc001288ee0 gate 1556789274161384200 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1107 0xc001288ee0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1108 0xc001288ee0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.162 UTC [cauthdsl] func2 -> DEBU 1109 0xc001288ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.163 UTC [cauthdsl] func2 -> DEBU 110a 0xc001288ee0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.164 UTC [cauthdsl] func1 -> DEBU 110b 0xc001288ee0 gate 1556789274161384200 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.164 UTC [policies] Evaluate -> DEBU 110c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.165 UTC [policies] Evaluate -> DEBU 110d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.166 UTC [policies] func1 -> DEBU 110e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:54.167 UTC [policies] Evaluate -> DEBU 110f Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.175 UTC [policies] Evaluate -> DEBU 1110 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.181 UTC [policies] Evaluate -> DEBU 1112 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.182 UTC [policies] Evaluate -> DEBU 1113 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1111 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 1114 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.187 UTC [cauthdsl] func1 -> DEBU 1115 0xc001256ae0 gate 1556789274187301300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.187 UTC [cauthdsl] func2 -> DEBU 1116 0xc001256ae0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 1117 0xc001256ae0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.190 UTC [cauthdsl] func2 -> DEBU 1118 0xc001256ae0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:54.192 UTC [msp.identity] Verify -> DEBU 1119 Verify: digest = 00000000 ad 0c 01 02 49 47 28 af 32 c6 d0 de c9 46 4f 0c |....IG(.2....FO.|
orderer0.example.com | 00000010 29 5d aa 7b d8 e3 34 c1 5d 25 d4 04 2c f1 65 6b |)].{..4.]%..,.ek|"
orderer0.example.com | "2019-05-02 09:27:54.193 UTC [msp.identity] Verify -> DEBU 111a Verify: sig = 00000000 30 44 02 20 3d 28 bd 57 ef b8 8c fe 5b c6 5a c3 |0D. =(.W....[.Z.|
orderer0.example.com | 00000010 b6 97 60 9b 98 91 68 72 0a 1a e9 93 dd 40 b3 8c |..`...hr.....@..|
orderer0.example.com | 00000020 71 1b 9f 9b 02 20 57 9d b8 7a 7e 90 b6 ed a6 c5 |q.... W..z~.....|
orderer0.example.com | 00000030 a5 f8 3d 6d 38 9b cc 35 bd c6 d8 f7 8e a8 48 ba |..=m8..5......H.|
orderer0.example.com | 00000040 be 7a fe 6a d3 b5 |.z.j..|"
orderer0.example.com | "2019-05-02 09:27:54.195 UTC [cauthdsl] func2 -> DEBU 111b 0xc001256ae0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:54.197 UTC [cauthdsl] func1 -> DEBU 111c 0xc001256ae0 gate 1556789274187301300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:54.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111d Sending msg of 28 bytes to 3 on channel testchainid took 45.5µs"
orderer0.example.com | "2019-05-02 09:27:54.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs "
orderer0.example.com | "2019-05-02 09:27:54.197 UTC [policies] Evaluate -> DEBU 111e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.202 UTC [policies] Evaluate -> DEBU 1120 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1121 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1122 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1123 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1124 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.205 UTC [common.deliver] deliverBlocks -> DEBU 1125 [channel: businesschannel] Received seekInfo (0xc0011ac140) start:<specified:<number:4 > > stop:<specified:<number:4 > > from 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.205 UTC [fsblkstorage] Next -> DEBU 1126 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:54.205 UTC [fsblkstorage] newBlockfileStream -> DEBU 1127 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]"
orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1128 Remaining bytes=[22584], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1129 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}"
orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 112a blockbytes [4707] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112b [channel: businesschannel] Delivering block [4] for (0xc0011ac140) for 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112c [channel: businesschannel] Done delivering to 172.18.0.8:57364 for (0xc0011ac140)"
orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112d Waiting for new SeekInfo from 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112e Attempting to read seek info message from 172.18.0.8:57364"
orderer0.example.com | "2019-05-02 09:27:54.227 UTC [grpc] warningf -> DEBU 112f transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57364: read: connection reset by peer"
orderer0.example.com | "2019-05-02 09:27:54.238 UTC [common.deliver] Handle -> WARN 1130 Error reading from 172.18.0.8:57364: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:54.239 UTC [orderer.common.server] func1 -> DEBU 1131 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:54.239 UTC [comm.grpc.server] 1 -> INFO 1132 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57364 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=86.7309ms
orderer0.example.com | "2019-05-02 09:27:54.240 UTC [grpc] infof -> DEBU 1133 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fa7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa8 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c|
peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|"
peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa9 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......|
peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i|
peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.|
peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...|
peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|"
peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU faa Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fab Verify: sig = 00000000 30 44 02 20 3b 55 b6 1d 82 73 43 c5 67 90 16 b5 |0D. ;U...sC.g...|
peer0.org1.example.com | 00000010 67 70 18 d3 72 13 14 af 0e be 95 24 60 b3 75 11 |gp..r......$`.u.|
peer0.org1.example.com | 00000020 cd ba f7 86 02 20 2b ba cb 4b 34 7d b1 25 6d 44 |..... +..K4}.%mD|
peer0.org1.example.com | 00000030 ec 2c 9f 0e 65 f0 b4 9b 37 4c e5 e2 ae 48 e6 97 |.,..e...7L...H..|
peer0.org1.example.com | 00000040 be 7f 78 8c 66 83 |..x.f.|"
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] handleAliveMessage -> DEBU fac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fad Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fae updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU faf Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleAliveMessage -> DEBU fb2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.gossip] handleMessage -> DEBU fb6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] sendMemResponse -> DEBU fb7 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.comm] Send -> DEBU fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.discovery] sendMemResponse -> DEBU fbb Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.157 UTC [gossip.comm] sendToEndpoint -> DEBU fc7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU fca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fcb Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [msp] DeserializeIdentity -> DEBU fcc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fcd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fce Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fcf Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [cauthdsl] func1 -> DEBU fd3 0xc0034d1780 gate 1556789249191891900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [cauthdsl] func2 -> DEBU fd4 0xc0034d1780 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.192 UTC [cauthdsl] func2 -> DEBU fd5 0xc0034d1780 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.193 UTC [cauthdsl] func2 -> DEBU fd6 0xc0034d1780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.194 UTC [cauthdsl] func2 -> DEBU fd7 0xc0034d1780 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.197 UTC [cauthdsl] func1 -> DEBU fd8 0xc0034d1780 gate 1556789249191891900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.197 UTC [policies] Evaluate -> DEBU fd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [cauthdsl] func1 -> DEBU fdc 0xc0034d1fc0 gate 1556789249198663100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [cauthdsl] func2 -> DEBU fdd 0xc0034d1fc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fde 0xc0034d1fc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fdf 0xc0034d1fc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe0 Verify: digest = 00000000 78 4a af f7 40 b0 72 3e df 0b 4f d9 26 5f 2a 45 |xJ..@.r>..O.&_*E|
peer0.org1.example.com | 00000010 de 4c 90 5c c8 e6 75 bd 8f 40 71 9c ea c9 95 f7 |.L.\..u..@q.....|"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe1 Verify: sig = 00000000 30 45 02 21 00 9d 58 b9 d5 9c cf 2b 3b c9 a9 cb |0E.!..X....+;...|
peer0.org1.example.com | 00000010 06 bb fa d7 a0 4b 77 b0 67 31 3c 44 0c f7 18 7c |.....Kw.g1<D...||
peer0.org1.example.com | 00000020 11 37 58 87 4f 02 20 1e 90 78 0a f9 51 96 f1 8b |.7X.O. ..x..Q...|
peer0.org1.example.com | 00000030 fe 1c 2d d2 fc b6 d6 02 00 6f be 5e 57 fa 28 ec |..-......o.^W.(.|
peer0.org1.example.com | 00000040 a5 f8 35 e5 5d 7a 3a |..5.]z:|"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fe2 0xc0034d1fc0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func1 -> DEBU fe3 0xc0034d1fc0 gate 1556789249198663100 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:54.425 UTC [orderer.common.server] Deliver -> DEBU 1134 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:54.425 UTC [common.deliver] Handle -> DEBU 1135 Starting new deliver loop for 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.426 UTC [common.deliver] Handle -> DEBU 1136 Attempting to read seek info message from 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1137 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1138 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1139 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 113a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.427 UTC [policies] Evaluate -> DEBU 113b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func1 -> DEBU 113c 0xc001158d60 gate 1556789274427426300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113d 0xc001158d60 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113e 0xc001158d60 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113f 0xc001158d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1140 0xc001158d60 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1141 0xc001158d60 gate 1556789274427426300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1142 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1143 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1144 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1145 0xc0011595a0 gate 1556789274428653300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1146 0xc0011595a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1147 0xc0011595a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1148 0xc0011595a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1149 0xc0011595a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func1 -> DEBU 114a 0xc0011595a0 gate 1556789274428653300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] func1 -> DEBU 114d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114e Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1150 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1151 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1152 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func1 -> DEBU 1153 0xc0011284d0 gate 1556789274430638000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1154 0xc0011284d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1155 0xc0011284d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.431 UTC [cauthdsl] func2 -> DEBU 1156 0xc0011284d0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1157 Verify: digest = 00000000 fa 9f 56 4a 61 78 23 71 18 54 ca 8c d6 4b e9 48 |..VJax#q.T...K.H|
orderer0.example.com | 00000010 2f 5e 22 d0 f9 62 4c 3b 8c 9b 10 d1 33 7f 34 3a |/^"..bL;....3.4:|"
orderer0.example.com | "2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1158 Verify: sig = 00000000 30 44 02 20 59 d9 de 5b 8f 1f 0b 38 a6 5c 63 26 |0D. Y..[...8.\c&|
orderer0.example.com | 00000010 51 62 e2 38 99 b4 3a ec 62 27 0d f4 da 24 59 c0 |Qb.8..:.b'...$Y.|
orderer0.example.com | 00000020 16 60 8a da 02 20 0a 41 34 24 b9 89 51 54 c6 e3 |.`... .A4$..QT..|
orderer0.example.com | 00000030 20 4e f8 17 97 96 bc 41 bb 68 f2 d5 05 1d 75 24 | N.....A.h....u$|
orderer0.example.com | 00000040 3f b8 bc d5 9a 20 |?.... |"
orderer0.example.com | "2019-05-02 09:27:54.432 UTC [cauthdsl] func2 -> DEBU 1159 0xc0011284d0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:54.432 UTC [cauthdsl] func1 -> DEBU 115a 0xc0011284d0 gate 1556789274430638000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:54.432 UTC [policies] Evaluate -> DEBU 115b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115d Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115f Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 1160 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.433 UTC [common.deliver] deliverBlocks -> DEBU 1161 [channel: businesschannel] Received seekInfo (0xc0010ce580) start:<specified:<number:5 > > stop:<specified:<number:5 > > from 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] Next -> DEBU 1162 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] newBlockfileStream -> DEBU 1163 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1164 Remaining bytes=[17875], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1165 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1166 blockbytes [5709] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:54.434 UTC [common.deliver] deliverBlocks -> DEBU 1167 [channel: businesschannel] Delivering block [5] for (0xc0010ce580) for 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] deliverBlocks -> DEBU 1168 [channel: businesschannel] Done delivering to 172.18.0.8:57366 for (0xc0010ce580)"
orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 1169 Waiting for new SeekInfo from 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 116a Attempting to read seek info message from 172.18.0.8:57366"
orderer0.example.com | "2019-05-02 09:27:54.444 UTC [grpc] infof -> DEBU 116b transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:54.444 UTC [common.deliver] Handle -> WARN 116c Error reading from 172.18.0.8:57366: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:54.444 UTC [orderer.common.server] func1 -> DEBU 116d Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:54.444 UTC [comm.grpc.server] 1 -> INFO 116e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57366 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3445ms
orderer0.example.com | "2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116f Sending msg of 28 bytes to 2 on channel businesschannel took 64.3µs"
orderer0.example.com | "2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1170 Sending msg of 28 bytes to 3 on channel businesschannel took 9.7µs"
orderer0.example.com | "2019-05-02 09:27:54.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1171 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs "
orderer0.example.com | "2019-05-02 09:27:54.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1173 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.6394ms "
orderer0.example.com | "2019-05-02 09:27:54.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1174 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.648 UTC [orderer.common.server] Deliver -> DEBU 1175 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1176 Starting new deliver loop for 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1177 Attempting to read seek info message from 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func1 -> DEBU 117d 0xc0011171d0 gate 1556789274652048300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117e 0xc0011171d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117f 0xc0011171d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 1180 0xc0011171d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.653 UTC [cauthdsl] func2 -> DEBU 1181 0xc0011171d0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.653 UTC [cauthdsl] func1 -> DEBU 1182 0xc0011171d0 gate 1556789274652048300 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1183 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1184 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1185 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func1 -> DEBU 1186 0xc001117a10 gate 1556789274654438400 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1187 0xc001117a10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1188 0xc001117a10 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.655 UTC [cauthdsl] func2 -> DEBU 1189 0xc001117a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.656 UTC [cauthdsl] func2 -> DEBU 118a 0xc001117a10 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.656 UTC [cauthdsl] func1 -> DEBU 118b 0xc001117a10 gate 1556789274654438400 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.656 UTC [policies] Evaluate -> DEBU 118c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.657 UTC [policies] Evaluate -> DEBU 118d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.657 UTC [policies] func1 -> DEBU 118e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 118f Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1190 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1191 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1192 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1193 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.660 UTC [cauthdsl] func1 -> DEBU 1194 0xc0010f4880 gate 1556789274660009600 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.660 UTC [cauthdsl] func2 -> DEBU 1195 0xc0010f4880 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1196 0xc0010f4880 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1197 0xc0010f4880 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [gossip.discovery] handleAliveMessage -> DEBU fe8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.200 UTC [gossip.discovery] learnExistingMembers -> DEBU fe9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.gossip] handleMessage -> DEBU fea Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:1097949335757868031 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.pull] HandleMessage -> DEBU feb GossipMessage: tag:EMPTY hello:<nonce:1097949335757868031 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fed Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.202 UTC [gossip.discovery] learnExistingMembers -> DEBU fee updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU fef Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 "
peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU ff0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] learnExistingMembers -> DEBU ff1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] handleAliveMessage -> DEBU ff2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU ff3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.pull] SendDigest -> DEBU ff8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ff9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffa Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU ffc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ffd Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 1005 0xc003775070 gate 1556789249209634900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1006 0xc003775070 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1007 0xc003775070 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1008 0xc003775070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1009 0xc003775070 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 100a 0xc003775070 gate 1556789249209634900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func1 -> DEBU 100e 0xc0037758d0 gate 1556789249210063700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 100f 0xc0037758d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1010 0xc0037758d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1011 0xc0037758d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...|
peer0.org1.example.com | 00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..|
peer0.org1.example.com | 00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......|
peer0.org1.example.com | 00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp..<t.o)|
peer0.org1.example.com | 00000030 b3 5e e2 17 05 c4 0e 20 55 4b fe 7b 15 f0 cf 72 |.^..... UK.{...r|
peer0.org1.example.com | 00000040 7b 52 d7 72 78 9d 67 |{R.rx.g|"
peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1014 0xc0037758d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [cauthdsl] func1 -> DEBU 1015 0xc0037758d0 gate 1556789249210063700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 101a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 "
peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] handleAliveMessage -> DEBU 1020 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1021 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [gossip.discovery] sendMemResponse -> DEBU 1022 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [msp] DeserializeIdentity -> DEBU 1023 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1024 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1025 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.218 UTC [gossip.comm] Send -> DEBU 1026 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.218 UTC [gossip.discovery] sendMemResponse -> DEBU 1027 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1028 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1029 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:54.661 UTC [msp.identity] Verify -> DEBU 1198 Verify: digest = 00000000 c0 d3 e5 e2 7c 29 f6 1c f9 28 a0 eb e6 53 e5 1c |....|)...(...S..|
orderer0.example.com | 00000010 47 f3 b1 51 60 48 cb 43 a7 76 36 4a e3 b2 cf 7a |G..Q`H.C.v6J...z|"
orderer0.example.com | "2019-05-02 09:27:54.662 UTC [msp.identity] Verify -> DEBU 1199 Verify: sig = 00000000 30 44 02 20 51 63 13 2e 65 a6 20 3e b8 41 2c 04 |0D. Qc..e. >.A,.|
orderer0.example.com | 00000010 d1 01 ed ab 52 e4 3c e1 08 28 f4 22 b0 a9 b6 c1 |....R.<..(."....|
orderer0.example.com | 00000020 3d 8d a1 55 02 20 03 2e dd 55 14 c6 dd e6 97 4d |=..U. ...U.....M|
orderer0.example.com | 00000030 1a ed f8 cf ba 2b 69 b1 24 5f 53 af 2a 99 76 11 |.....+i.$_S.*.v.|
orderer0.example.com | 00000040 41 1b 72 54 51 88 |A.rTQ.|"
orderer0.example.com | "2019-05-02 09:27:54.663 UTC [cauthdsl] func2 -> DEBU 119a 0xc0010f4880 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:54.663 UTC [cauthdsl] func1 -> DEBU 119b 0xc0010f4880 gate 1556789274660009600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:54.663 UTC [policies] Evaluate -> DEBU 119c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.664 UTC [policies] Evaluate -> DEBU 119d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119e Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.666 UTC [policies] Evaluate -> DEBU 11a0 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.667 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.668 UTC [common.deliver] deliverBlocks -> DEBU 11a2 [channel: businesschannel] Received seekInfo (0xc0010cf5c0) start:<specified:<number:6 > > stop:<specified:<number:6 > > from 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] Next -> DEBU 11a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] newBlockfileStream -> DEBU 11a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]"
orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a5 Remaining bytes=[12164], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a6 Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}"
orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a7 blockbytes [4060] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:54.670 UTC [common.deliver] deliverBlocks -> DEBU 11a8 [channel: businesschannel] Delivering block [6] for (0xc0010cf5c0) for 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.671 UTC [common.deliver] deliverBlocks -> DEBU 11a9 [channel: businesschannel] Done delivering to 172.18.0.8:57368 for (0xc0010cf5c0)"
orderer0.example.com | "2019-05-02 09:27:54.672 UTC [common.deliver] Handle -> DEBU 11aa Waiting for new SeekInfo from 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.673 UTC [common.deliver] Handle -> DEBU 11ab Attempting to read seek info message from 172.18.0.8:57368"
orderer0.example.com | "2019-05-02 09:27:54.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ac Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ad Sending msg of 28 bytes to 3 on channel testchainid took 134.4µs"
orderer0.example.com | "2019-05-02 09:27:54.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.1µs "
orderer0.example.com | "2019-05-02 09:27:54.682 UTC [common.deliver] Handle -> WARN 11af Error reading from 172.18.0.8:57368: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:54.682 UTC [orderer.common.server] func1 -> DEBU 11b0 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:54.682 UTC [comm.grpc.server] 1 -> INFO 11b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57368 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.6064ms
orderer0.example.com | "2019-05-02 09:27:54.681 UTC [grpc] infof -> DEBU 11b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:54.870 UTC [orderer.common.server] Deliver -> DEBU 11b3 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b4 Starting new deliver loop for 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b5 Attempting to read seek info message from 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func1 -> DEBU 11bb 0xc0010e2fc0 gate 1556789274872258100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bc 0xc0010e2fc0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bd 0xc0010e2fc0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11be 0xc0010e2fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bf 0xc0010e2fc0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0010e2fc0 gate 1556789274872258100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c4 0xc0010e3800 gate 1556789274873552600 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c5 0xc0010e3800 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c6 0xc0010e3800 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0010e3800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0010e3800 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.874 UTC [cauthdsl] func1 -> DEBU 11c9 0xc0010e3800 gate 1556789274873552600 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11ca Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] func1 -> DEBU 11cc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cd Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func1 -> DEBU 11d2 0xc0010d24f0 gate 1556789274876175000 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d3 0xc0010d24f0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d4 0xc0010d24f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0010d24f0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d6 Verify: digest = 00000000 f9 ed 45 d2 7d dc 66 16 10 b0 82 7b 45 1a c1 90 |..E.}.f....{E...|
orderer0.example.com | 00000010 03 8c f4 ce 07 32 ad 13 37 53 e3 5f 2d 1b 23 88 |.....2..7S._-.#.|"
orderer0.example.com | "2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d7 Verify: sig = 00000000 30 44 02 20 34 be bb 83 0d 7c af 8d ce 15 82 4e |0D. 4....|.....N|
orderer0.example.com | 00000010 53 a7 58 f9 2e 5b c7 a4 d4 e9 33 4a 54 ee 20 84 |S.X..[....3JT. .|
orderer0.example.com | 00000020 24 8b 8d 4d 02 20 77 70 3d 6f e8 51 21 ed 20 c7 |$..M. wp=o.Q!. .|
orderer0.example.com | 00000030 2d 76 45 c7 98 41 bd cc 44 cc a3 ff b6 b1 c5 67 |-vE..A..D......g|
orderer0.example.com | 00000040 28 af 00 9e ad bc |(.....|"
orderer0.example.com | "2019-05-02 09:27:54.877 UTC [cauthdsl] func2 -> DEBU 11d8 0xc0010d24f0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:54.877 UTC [cauthdsl] func1 -> DEBU 11d9 0xc0010d24f0 gate 1556789274876175000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11da Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11db == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dc Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11de Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:54.878 UTC [common.deliver] deliverBlocks -> DEBU 11e0 [channel: businesschannel] Received seekInfo (0xc0010cfb80) start:<specified:<number:7 > > stop:<specified:<number:7 > > from 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] Next -> DEBU 11e1 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]"
orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e3 Remaining bytes=[8102], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}"
orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e6 [channel: businesschannel] Delivering block [7] for (0xc0010cfb80) for 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Done delivering to 172.18.0.8:57370 for (0xc0010cfb80)"
orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e8 Waiting for new SeekInfo from 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e9 Attempting to read seek info message from 172.18.0.8:57370"
orderer0.example.com | "2019-05-02 09:27:54.888 UTC [grpc] infof -> DEBU 11ea transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:54.889 UTC [common.deliver] Handle -> WARN 11eb Error reading from 172.18.0.8:57370: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:54.889 UTC [orderer.common.server] func1 -> DEBU 11ec Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:54.889 UTC [comm.grpc.server] 1 -> INFO 11ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57370 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6047ms
orderer0.example.com | "2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ee Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs"
orderer0.example.com | "2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ef Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs"
orderer0.example.com | "2019-05-02 09:27:54.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 975µs "
orderer0.example.com | "2019-05-02 09:27:54.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.8µs "
orderer0.example.com | "2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.073 UTC [orderer.common.server] Deliver -> DEBU 11f4 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f5 Starting new deliver loop for 172.18.0.8:57372"
orderer0.example.com | "2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f6 Attempting to read seek info message from 172.18.0.8:57372"
peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [gossip.comm] sendToEndpoint -> DEBU 102a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 102b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.221 UTC [msp] DeserializeIdentity -> DEBU 102f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [gossip.comm] Send -> DEBU 1031 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1033 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] Send -> DEBU 1035 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1036 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1037 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.221 UTC [gossip.gossip] handleMessage -> DEBU 102e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1038 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1039 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 103e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 103f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 1040 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1042 Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp] DeserializeIdentity -> DEBU 1046 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp.identity] newIdentity -> DEBU 1047 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI
peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO
peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA
peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM
peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q
peer0.org1.example.com | 1A==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func1 -> DEBU 1048 0xc003828ef0 gate 1556789249993801100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 1049 0xc003828ef0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 104a 0xc003828ef0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 104b Checking if identity satisfies MEMBER role for OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp] Validate -> DEBU 104c MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 104d 0xc003828ef0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104e Verify: digest = 00000000 c9 bd 12 d3 d2 07 29 01 a6 20 32 de 2d c6 dc f5 |......).. 2.-...|
peer0.org1.example.com | 00000010 f4 0e 6f 90 a3 69 ba 40 c6 0c 58 ee 7f ee 0d 6b |..o..i.@..X....k|"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104f Verify: sig = 00000000 30 44 02 20 09 7d 08 a8 ac 23 13 65 98 37 14 9b |0D. .}...#.e.7..|
peer0.org1.example.com | 00000010 18 ab 5a 5c 08 57 7a ef eb cf 15 e5 3c 2c f1 d4 |..Z\.Wz.....<,..|
peer0.org1.example.com | 00000020 94 d0 b8 9e 02 20 5a b3 fb a2 36 7c 33 b6 12 3d |..... Z...6|3..=|
peer0.org1.example.com | 00000030 8d 54 03 97 19 8e d8 21 48 1e 82 bc 84 64 bf 3b |.T.....!H....d.;|
peer0.org1.example.com | 00000040 11 96 e1 22 ef 6f |...".o|"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 1050 0xc003828ef0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func1 -> DEBU 1051 0xc003828ef0 gate 1556789249993801100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1052 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1053 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1054 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1055 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1056 [businesschannel] Adding payload to local buffer, blockNum = [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1057 [businesschannel] Adding payload to local buffer, blockNum = [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1058 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1059 [businesschannel] Gossiping block [3], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.channel] AddToMsgStore -> DEBU 105a Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.pull] Add -> DEBU 105b Added 3, total items: 3"
peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] deliverPayloads -> DEBU 105c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.state] deliverPayloads -> DEBU 105d [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> INFO 105e [businesschannel] Received block [3] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> DEBU 105f [businesschannel] Validating block [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1060 [businesschannel] START Block Validation for block [3]"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1061 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] validateTx -> DEBU 1062 [businesschannel] validateTx starts for block 0xc0027182c0 env 0xc002d40690 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1063 ValidateTransactionEnvelope starts for envelope 0xc002d40690"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1064 Header is channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021<j!\211\2615\312C\355\347\253\021F\247\372R" "
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] validateChannelHeader -> DEBU 1065 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1066 begin"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp] GetManagerForChain -> DEBU 1067 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1068 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1069 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106a Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=|
peer0.org1.example.com | 00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|"
peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106b Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....|
peer0.org1.example.com | 00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n|
peer0.org1.example.com | 00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^|
peer0.org1.example.com | 00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..|
peer0.org1.example.com | 00000040 fa b9 0d de c0 80 62 |......b|"
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 106c exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106d validateEndorserTransaction starts for data 0xc00217aa80, header channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021<j!\211\2615\312C\355\347\253\021F\247\372R" "
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106e validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106f validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] ValidateTransaction -> DEBU 1070 ValidateTransactionEnvelope returns err %!s(<nil>)"
orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.076 UTC [cauthdsl] func1 -> DEBU 11fc 0xc0010b29d0 gate 1556789275076391100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.076 UTC [cauthdsl] func2 -> DEBU 11fd 0xc0010b29d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11fe 0xc0010b29d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11ff 0xc0010b29d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 1200 0xc0010b29d0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func1 -> DEBU 1201 0xc0010b29d0 gate 1556789275076391100 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 1205 0xc0010b3330 gate 1556789275077999500 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1206 0xc0010b3330 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1207 0xc0010b3330 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1208 0xc0010b3330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1209 0xc0010b3330 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 120a 0xc0010b3330 gate 1556789275077999500 evaluation fails"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] func1 -> DEBU 120d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120e Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1210 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1211 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [cauthdsl] func1 -> DEBU 1213 0xc001094020 gate 1556789275079836300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.079 UTC [cauthdsl] func2 -> DEBU 1214 0xc001094020 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1215 0xc001094020 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1216 0xc001094020 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1217 Verify: digest = 00000000 5d 72 74 87 aa 9b 16 3c e5 61 26 08 88 d7 3f 07 |]rt....<.a&...?.|
orderer0.example.com | 00000010 ee eb 9d be 0f a5 6b 62 55 db e9 32 06 81 59 2c |......kbU..2..Y,|"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1218 Verify: sig = 00000000 30 45 02 21 00 b1 d8 d3 d7 0c 64 ce a2 b4 31 73 |0E.!......d...1s|
orderer0.example.com | 00000010 10 b7 ad 1a 51 97 52 0f bd f5 e1 f8 3c 46 b7 50 |....Q.R.....<F.P|
orderer0.example.com | 00000020 bb 6a 4b 11 28 02 20 68 8d 3a b8 ae 64 3a 64 09 |.jK.(. h.:..d:d.|
orderer0.example.com | 00000030 a6 a1 f6 55 2a 27 2d 10 71 d1 be f7 4f 85 26 c9 |...U*'-.q...O.&.|
orderer0.example.com | 00000040 58 8b 6c fd e0 b0 76 |X.l...v|"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1219 0xc001094020 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func1 -> DEBU 121a 0xc001094020 gate 1556789275079836300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121d Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121f Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.081 UTC [common.deliver] deliverBlocks -> DEBU 1221 [channel: businesschannel] Received seekInfo (0xc001190b80) start:<specified:<number:8 > > stop:<specified:<number:8 > > from 172.18.0.8:57372"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] Next -> DEBU 1222 Initializing block stream for iterator. itr.maxBlockNumAvailable=8"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1223 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1224 Remaining bytes=[4051], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1225 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1226 blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1227 [channel: businesschannel] Delivering block [8] for (0xc001190b80) for 172.18.0.8:57372"
peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [committer.txvalidator] validateTx -> DEBU 1071 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:29.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1072 retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]"
peer0.org1.example.com | "2019-05-02 09:27:29.998 UTC [committer.txvalidator] validateTx -> DEBU 1073 Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:29.999 UTC [committer.txvalidator] Dispatch -> DEBU 1074 [businesschannel] Dispatch starts for bytes 0xc00217d000"
peer0.org1.example.com | "2019-05-02 09:27:30.001 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1075 constructing new query executor txid = [3376978c-42b4-4f4d-894e-11a19df7b970]"
peer0.org1.example.com | "2019-05-02 09:27:30.002 UTC [lockbasedtxmgr] Done -> DEBU 1076 Done with transaction simulation / query execution [3376978c-42b4-4f4d-894e-11a19df7b970]"
peer0.org1.example.com | "2019-05-02 09:27:30.002 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1077 Validating Tx fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin"
peer0.org1.example.com | "2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1078 constructing new query executor txid = [438fb3c7-59f2-4867-90a3-7004d636656c]"
peer0.org1.example.com | "2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1079 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:30.007 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 107a retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107b Done with transaction simulation / query execution [438fb3c7-59f2-4867-90a3-7004d636656c]"
peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 107c constructing new query executor txid = [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]"
peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107d Done with transaction simulation / query execution [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]"
peer0.org1.example.com | "2019-05-02 09:27:30.009 UTC [policies] Evaluate -> DEBU 107e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement =="
peer0.org1.example.com | "2019-05-02 09:27:30.010 UTC [msp] DeserializeIdentity -> DEBU 107f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.011 UTC [msp.identity] newIdentity -> DEBU 1080 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func1 -> DEBU 1081 0xc0038aef40 gate 1556789250012196000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1082 0xc0038aef40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1083 0xc0038aef40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1084 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [msp] Validate -> DEBU 1085 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [msp] getCertificationChain -> DEBU 1086 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [cauthdsl] func2 -> DEBU 1087 0xc0038aef40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.014 UTC [msp.identity] Verify -> DEBU 1088 Verify: digest = 00000000 f6 ba d1 c1 e9 ae 67 52 1a 19 de 11 16 71 4e ee |......gR.....qN.|
peer0.org1.example.com | 00000010 2c a6 7c 45 4e 4b eb 9c c4 1b 90 91 65 fe 73 d4 |,.|ENK......e.s.|"
peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [msp.identity] Verify -> DEBU 1089 Verify: sig = 00000000 30 45 02 21 00 f1 91 b5 c8 e8 ee de 4c 2a 82 b1 |0E.!........L*..|
peer0.org1.example.com | 00000010 ff 7d b5 dd c8 dd 5e e8 2d e5 b8 01 cf 99 ef aa |.}....^.-.......|
peer0.org1.example.com | 00000020 28 93 90 d8 5a 02 20 79 0c 74 7a cc 1f 09 8b 10 |(...Z. y.tz.....|
peer0.org1.example.com | 00000030 bb 87 e8 a2 f0 91 99 fd d3 77 9d 25 71 28 29 af |.........w.%q().|
peer0.org1.example.com | 00000040 a2 ef 94 af 0a ad 75 |......u|"
peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [cauthdsl] func2 -> DEBU 108a 0xc0038aef40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [cauthdsl] func1 -> DEBU 108b 0xc0038aef40 gate 1556789250012196000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108c Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 108e constructing new query executor txid = [971d2601-2a1a-4acd-9c5f-01ba1856704a]"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 108f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1090 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] Done -> DEBU 1091 Done with transaction simulation / query execution [971d2601-2a1a-4acd-9c5f-01ba1856704a]"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1092 constructing new query executor txid = [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1093 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
orderer0.example.com | "2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1228 [channel: businesschannel] Done delivering to 172.18.0.8:57372 for (0xc001190b80)"
orderer0.example.com | "2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 1229 Waiting for new SeekInfo from 172.18.0.8:57372"
orderer0.example.com | "2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 122a Attempting to read seek info message from 172.18.0.8:57372"
orderer0.example.com | "2019-05-02 09:27:55.090 UTC [common.deliver] Handle -> WARN 122b Error reading from 172.18.0.8:57372: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:55.091 UTC [orderer.common.server] func1 -> DEBU 122d Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:55.091 UTC [comm.grpc.server] 1 -> INFO 122e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57372 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.5619ms
orderer0.example.com | "2019-05-02 09:27:55.090 UTC [grpc] infof -> DEBU 122c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:55.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs"
orderer0.example.com | "2019-05-02 09:27:55.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs "
orderer0.example.com | "2019-05-02 09:27:55.310 UTC [orderer.common.server] Deliver -> DEBU 1232 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1233 Starting new deliver loop for 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1234 Attempting to read seek info message from 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1235 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1236 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1237 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1238 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.314 UTC [policies] Evaluate -> DEBU 1239 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.315 UTC [msp] DeserializeIdentity -> DEBU 123a Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:55.316 UTC [msp.identity] newIdentity -> DEBU 123b Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:27:55.317 UTC [cauthdsl] func1 -> DEBU 123c 0xc00105e8a0 gate 1556789275317530800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.317 UTC [cauthdsl] func2 -> DEBU 123d 0xc00105e8a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.318 UTC [cauthdsl] func2 -> DEBU 123e 0xc00105e8a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.319 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 123f Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:27:55.319 UTC [msp] Validate -> DEBU 1240 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:27:55.320 UTC [cauthdsl] func2 -> DEBU 1241 0xc00105e8a0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 18 93 3a f3 8f 51 4c 97 83 64 25 4a 0f 9d 16 75 |..:..QL..d%J...u|
orderer0.example.com | 00000010 06 bd 69 8c fa 3b 9a ab aa 6b 17 3d f2 6b a8 e7 |..i..;...k.=.k..|"
orderer0.example.com | "2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 78 46 3b a9 fa 0a d8 f0 11 ff e2 0b |0D. xF;.........|
orderer0.example.com | 00000010 71 dd 3e ff 70 97 a3 aa 7a 0c 5d 32 3c 22 db c2 |q.>.p...z.]2<"..|
orderer0.example.com | 00000020 9b 03 8e b3 02 20 27 95 5c 39 bc af 69 cb 45 11 |..... '.\9..i.E.|
orderer0.example.com | 00000030 ff 6e d7 40 9d 7f 34 e9 d4 de 10 3a 86 b9 b1 4d |.n.@..4....:...M|
orderer0.example.com | 00000040 3c 9d e4 3c 0c 6c |<..<.l|"
orderer0.example.com | "2019-05-02 09:27:55.322 UTC [cauthdsl] func2 -> DEBU 1244 0xc00105e8a0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.322 UTC [cauthdsl] func1 -> DEBU 1245 0xc00105e8a0 gate 1556789275317530800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124a Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.326 UTC [common.deliver] deliverBlocks -> DEBU 124c [channel: testchainid] Received seekInfo (0xc001191300) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] Next -> DEBU 124d Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] newBlockfileStream -> DEBU 124e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124f Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1250 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:27:55.328 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1251 blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.328 UTC [common.deliver] deliverBlocks -> DEBU 1252 [channel: testchainid] Delivering block [1] for (0xc001191300) for 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.329 UTC [common.deliver] deliverBlocks -> DEBU 1253 [channel: testchainid] Done delivering to 172.18.0.8:57374 for (0xc001191300)"
peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1094 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] Done -> DEBU 1095 Done with transaction simulation / query execution [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]"
peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1096 constructing new query executor txid = [2420b70c-c870-4439-b6f4-e5060665642d]"
peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1097 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1098 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 1099 Done with transaction simulation / query execution [2420b70c-c870-4439-b6f4-e5060665642d]"
peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109a constructing new query executor txid = [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]"
peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 109d Done with transaction simulation / query execution [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109e constructing new query executor txid = [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10a0 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a1 Done with transaction simulation / query execution [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [vscc] Validate -> DEBU 10a2 block 3, namespace: _lifecycle, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 10a3 Transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Dispatch -> DEBU 10a4 [businesschannel] Dispatch completes env bytes 0xc00217d000"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] validateTx -> DEBU 10a5 [businesschannel] validateTx completes for block 0xc0027182c0 env 0xc002d40690 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> DEBU 10a6 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> INFO 10a7 [businesschannel] Validated block [3] in 24ms"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a8 constructing new query executor txid = [e6ada518-a977-452b-8e53-fe283617feed]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a9 Done with transaction simulation / query execution [e6ada518-a977-452b-8e53-fe283617feed]"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp] GetManagerForChain -> DEBU 10aa Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func1 -> DEBU 10ab 0xc0039104b0 gate 1556789250019687700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ac 0xc0039104b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ad 0xc0039104b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ae 0xc0039104b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10af Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... |
peer0.org1.example.com | 00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|"
peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10b0 Verify: sig = 00000000 30 44 02 20 48 9c ca c4 a4 a8 2d 4c 45 08 31 b8 |0D. H.....-LE.1.|
peer0.org1.example.com | 00000010 a6 12 3b ce 60 ea 4a 53 9d 05 ba fd e2 01 8d 3f |..;.`.JS.......?|
peer0.org1.example.com | 00000020 7f 77 15 88 02 20 3f ca a9 21 29 53 d0 5b 09 e5 |.w... ?..!)S.[..|
peer0.org1.example.com | 00000030 2b e3 68 49 77 5d 19 ed cb 2c 61 13 02 4d 19 25 |+.hIw]...,a..M.%|
peer0.org1.example.com | 00000040 c9 c5 ee c0 b5 da |......|"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [cauthdsl] func2 -> DEBU 10b1 0xc0039104b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [cauthdsl] func1 -> DEBU 10b2 0xc0039104b0 gate 1556789250019687700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [gossip.privdata] listMissingPrivateData -> DEBU 10b3 Retrieving private write sets for 1 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU 10b4 Getting private data from transient store for transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [leveldbhelper] GetIterator -> DEBU 10b5 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]"
peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [gossip.privdata] StoreBlock -> DEBU 10b6 [businesschannel] No missing collection private write sets to fetch from remote peers"
orderer0.example.com | "2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1254 Waiting for new SeekInfo from 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1255 Attempting to read seek info message from 172.18.0.8:57374"
orderer0.example.com | "2019-05-02 09:27:55.336 UTC [grpc] infof -> DEBU 1256 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:55.337 UTC [common.deliver] Handle -> WARN 1257 Error reading from 172.18.0.8:57374: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:55.339 UTC [orderer.common.server] func1 -> DEBU 1258 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:55.339 UTC [comm.grpc.server] 1 -> INFO 1259 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57374 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.0399ms
orderer0.example.com | "2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125a Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs"
orderer0.example.com | "2019-05-02 09:27:55.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs "
orderer0.example.com | "2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125c Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs"
orderer0.example.com | "2019-05-02 09:27:55.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2124ms "
orderer0.example.com | "2019-05-02 09:27:55.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.540 UTC [orderer.common.server] Deliver -> DEBU 1260 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:55.541 UTC [common.deliver] Handle -> DEBU 1261 Starting new deliver loop for 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.542 UTC [common.deliver] Handle -> DEBU 1262 Attempting to read seek info message from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1263 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1264 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1265 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1266 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1267 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.545 UTC [cauthdsl] func1 -> DEBU 1268 0xc000889fe0 gate 1556789275545604100 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.545 UTC [cauthdsl] func2 -> DEBU 1269 0xc000889fe0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126a 0xc000889fe0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126b 0xc000889fe0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126c Verify: digest = 00000000 a0 af 2e 60 21 b7 2c f5 ab 6b 2a ee 36 6d 79 28 |...`!.,..k*.6my(|
orderer0.example.com | 00000010 ea 79 cc af 36 3f 28 0c df 01 1c b4 4e 9a 79 1b |.y..6?(.....N.y.|"
orderer0.example.com | "2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126d Verify: sig = 00000000 30 44 02 20 08 92 4a 66 a0 24 ef 6a 54 42 f3 55 |0D. ..Jf.$.jTB.U|
orderer0.example.com | 00000010 71 8d 3e 52 25 6e 65 12 04 93 98 10 30 38 11 fa |q.>R%ne.....08..|
orderer0.example.com | 00000020 be 20 8b ab 02 20 0b d8 24 00 d5 44 3f f1 dc be |. ... ..$..D?...|
orderer0.example.com | 00000030 ed 70 bc 36 c2 bb 4a d9 a7 57 6a 30 33 9d 00 60 |.p.6..J..Wj03..`|
orderer0.example.com | 00000040 70 b2 44 d9 06 3a |p.D..:|"
orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126e 0xc000889fe0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.547 UTC [cauthdsl] func1 -> DEBU 126f 0xc000889fe0 gate 1556789275545604100 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.547 UTC [policies] Evaluate -> DEBU 1270 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1271 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1272 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1274 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1275 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.548 UTC [common.deliver] deliverBlocks -> DEBU 1276 [channel: testchainid] Received seekInfo (0xc001191cc0) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] Next -> DEBU 1277 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] newBlockfileStream -> DEBU 1278 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1279 Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127a Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127b blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127c [channel: testchainid] Delivering block [1] for (0xc001191cc0) for 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127d [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001191cc0)"
orderer0.example.com | "2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127e Waiting for new SeekInfo from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127f Attempting to read seek info message from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1280 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1281 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1282 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1283 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1284 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.557 UTC [cauthdsl] func1 -> DEBU 1285 0xc0010794b0 gate 1556789275557087800 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1286 0xc0010794b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1287 0xc0010794b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1288 0xc0010794b0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 1289 Verify: digest = 00000000 bd a8 93 90 1e c8 e2 03 73 08 f8 f9 a5 26 e6 74 |........s....&.t|
orderer0.example.com | 00000010 9e bb a8 9d 61 dc 00 cc 8f f7 d9 fe 93 30 e9 10 |....a........0..|"
orderer0.example.com | "2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 128a Verify: sig = 00000000 30 45 02 21 00 82 16 17 fe f9 8e b4 3b dc 79 32 |0E.!........;.y2|
orderer0.example.com | 00000010 55 12 fb a2 4e 83 d3 43 28 c3 52 52 4f d0 84 26 |U...N..C(.RRO..&|
orderer0.example.com | 00000020 26 55 3f c5 6c 02 20 3f 88 34 6a ca ec 6f db 6e |&U?.l. ?.4j..o.n|
orderer0.example.com | 00000030 19 bc 01 d4 aa e9 bb da 42 ea aa 5a 4b 22 88 e9 |........B..ZK"..|
orderer0.example.com | 00000040 d7 ab b5 44 13 9d 3c |...D..<|"
orderer0.example.com | "2019-05-02 09:27:55.560 UTC [cauthdsl] func2 -> DEBU 128b 0xc0010794b0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.561 UTC [cauthdsl] func1 -> DEBU 128c 0xc0010794b0 gate 1556789275557087800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.561 UTC [policies] Evaluate -> DEBU 128d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.562 UTC [policies] Evaluate -> DEBU 128e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.563 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.565 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.566 UTC [common.deliver] deliverBlocks -> DEBU 1293 [channel: testchainid] Received seekInfo (0xc001056240) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] Next -> DEBU 1294 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1295 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1296 Remaining bytes=[44241], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1297 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:55.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1298 blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 1299 [channel: testchainid] Delivering block [0] for (0xc001056240) for 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 129a [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001056240)"
orderer0.example.com | "2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129b Waiting for new SeekInfo from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129c Attempting to read seek info message from 172.18.0.8:57376"
orderer0.example.com | "2019-05-02 09:27:55.579 UTC [common.deliver] Handle -> WARN 129d Error reading from 172.18.0.8:57376: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:55.580 UTC [orderer.common.server] func1 -> DEBU 129e Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:55.580 UTC [comm.grpc.server] 1 -> INFO 129f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57376 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.7269ms
orderer0.example.com | "2019-05-02 09:27:55.580 UTC [grpc] infof -> DEBU 12a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:55.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a2 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs"
orderer0.example.com | "2019-05-02 09:27:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 485.3µs "
orderer0.example.com | "2019-05-02 09:27:55.728 UTC [orderer.common.server] Deliver -> DEBU 12a4 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a5 Starting new deliver loop for 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a6 Attempting to read seek info message from 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.729 UTC [cauthdsl] func1 -> DEBU 12ac 0xc00091eb70 gate 1556789275729816600 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ad 0xc00091eb70 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ae 0xc00091eb70 processing identity 0 with bytes of efef60"
peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [gossip.privdata] StoreBlock -> DEBU 10b7 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]"
peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [kvledger] CommitWithPvtData -> DEBU 10b8 [businesschannel] Validating state for block [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10b9 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ba lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10bb Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bc ValidateAndPrepareBatch() for block number = [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bd preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] preprocessProtoBlock -> DEBU 10be txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [stateleveldb] GetState -> DEBU 10bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [statebasedval] validateKVRead -> DEBU 10c0 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)"
peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c1 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'"
peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 10c3 Block [3] Transaction index [0] TxId [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] marked as valid by state validator. ContainsPostOrderWrites [false]"
peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [valinternal] ApplyWriteSet -> DEBU 10c4 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc002792740), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc002792800), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0027926c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc002792700), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc0027927c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc002792780)}"
peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c5 validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c7 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c8 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10ca Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>,O<><4F>z<0E><><EFBFBD>q<EFBFBD>{<7B><>:<3A>1oS'<27>w? <0B><><EFBFBD>j<EFBFBD><6A>:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleStateUpdates -> DEBU 10cc Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 10ce Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10cf Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] Send -> DEBU 10d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d1 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12af 0xc00091eb70 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b0 Verify: digest = 00000000 59 89 45 0a 74 27 16 b8 95 50 7f 23 45 7e 8b 73 |Y.E.t'...P.#E~.s|
orderer0.example.com | 00000010 77 f1 10 45 23 34 42 49 ea f8 f1 0f 18 67 f0 57 |w..E#4BI.....g.W|"
orderer0.example.com | "2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b1 Verify: sig = 00000000 30 44 02 20 46 81 8b 21 76 d6 1b b5 bb 7a 70 83 |0D. F..!v....zp.|
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d2 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [confighistory] HandleStateUpdates -> ERRO 10d4 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037d7120)}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d5 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [kvledger] CommitWithPvtData -> DEBU 10d8 [businesschannel] Committing block [3] to storage"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [ledgerstorage] CommitWithPvtData -> DEBU 10d9 Writing block [3] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10da constructing new query executor txid = [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]"
peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] Done -> DEBU 10db Done with transaction simulation / query execution [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]"
peer0.org1.example.com | "2019-05-02 09:27:30.027 UTC [pvtdatastorage] Prepare -> DEBU 10dc Saved 1 private data write sets for block [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10dd Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets=
peer0.org1.example.com | txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10de Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:30.031 UTC [fsblkstorage] indexBlock -> DEBU 10df Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx number:[0] ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:30.034 UTC [fsblkstorage] updateCheckpoint -> DEBU 10e0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76084], isChainEmpty=[false], lastBlockNumber=[3]"
peer0.org1.example.com | "2019-05-02 09:27:30.034 UTC [pvtdatastorage] Commit -> DEBU 10e1 Committing private data for block [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtdatastorage] Commit -> DEBU 10e2 Committed private data for block [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [kvledger] CommitWithPvtData -> DEBU 10e3 [businesschannel] Committing block [3] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e4 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e5 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e6 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e7 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]"
peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e8 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]"
peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e9 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]"
peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ea Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]"
peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10eb Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]"
peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ec Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]"
peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [lockbasedtxmgr] Commit -> DEBU 10ed Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ee Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ef Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]"
orderer0.example.com | 00000010 52 36 bd 38 52 32 57 4e 88 0a 74 47 a0 0a 61 e6 |R6.8R2WN..tG..a.|
orderer0.example.com | 00000020 c3 95 b9 31 02 20 05 d4 65 c5 16 8a 7a 3e 55 8f |...1. ..e...z>U.|
orderer0.example.com | 00000030 fd 65 c6 81 bc 79 94 af 7d 6a cb 64 39 0d 4e 54 |.e...y..}j.d9.NT|
orderer0.example.com | 00000040 6d 3e 93 3e ab e3 |m>.>..|"
orderer0.example.com | "2019-05-02 09:27:55.731 UTC [cauthdsl] func2 -> DEBU 12b2 0xc00091eb70 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.731 UTC [cauthdsl] func1 -> DEBU 12b3 0xc00091eb70 gate 1556789275729816600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b6 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b8 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.733 UTC [common.deliver] deliverBlocks -> DEBU 12ba [channel: testchainid] Received seekInfo (0xc00102af40) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.735 UTC [fsblkstorage] Next -> DEBU 12bb Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:27:55.735 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bd Remaining bytes=[44241], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12be Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bf blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.736 UTC [common.deliver] deliverBlocks -> DEBU 12c0 [channel: testchainid] Delivering block [0] for (0xc00102af40) for 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.737 UTC [common.deliver] deliverBlocks -> DEBU 12c1 [channel: testchainid] Done delivering to 172.18.0.8:57378 for (0xc00102af40)"
orderer0.example.com | "2019-05-02 09:27:55.737 UTC [common.deliver] Handle -> DEBU 12c2 Waiting for new SeekInfo from 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.738 UTC [common.deliver] Handle -> DEBU 12c3 Attempting to read seek info message from 172.18.0.8:57378"
orderer0.example.com | "2019-05-02 09:27:55.745 UTC [common.deliver] Handle -> WARN 12c4 Error reading from 172.18.0.8:57378: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:55.745 UTC [orderer.common.server] func1 -> DEBU 12c5 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:55.745 UTC [comm.grpc.server] 1 -> INFO 12c6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57378 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.7529ms
orderer0.example.com | "2019-05-02 09:27:55.746 UTC [grpc] infof -> DEBU 12c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:55.940 UTC [orderer.common.server] Deliver -> DEBU 12c8 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12c9 Starting new deliver loop for 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12ca Attempting to read seek info message from 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func1 -> DEBU 12d0 0xc000b87db0 gate 1556789275943020300 evaluation starts"
orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d1 0xc000b87db0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d2 0xc000b87db0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:27:55.944 UTC [cauthdsl] func2 -> DEBU 12d3 0xc000b87db0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d4 Verify: digest = 00000000 9e 90 26 06 26 20 25 09 b4 7f 89 a8 15 11 81 39 |..&.& %........9|
orderer0.example.com | 00000010 4d d9 b9 8f 11 37 bd 83 ed 6a 90 6d 00 0e ff bf |M....7...j.m....|"
orderer0.example.com | "2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d5 Verify: sig = 00000000 30 44 02 20 63 51 3b 4a 31 d6 b6 90 85 73 6b 3e |0D. cQ;J1....sk>|
orderer0.example.com | 00000010 fe e7 8a 5c 25 ae 26 bb 82 73 79 6e de f8 44 fe |...\%.&..syn..D.|
orderer0.example.com | 00000020 ef e8 b5 f3 02 20 13 c1 4a 09 47 d1 bf 05 d4 f4 |..... ..J.G.....|
orderer0.example.com | 00000030 60 ce 6d 02 61 05 4c 02 5d 0b 7c 2b 12 f2 e3 d3 |`.m.a.L.].|+....|
orderer0.example.com | 00000040 7b 38 20 ef c1 43 |{8 ..C|"
orderer0.example.com | "2019-05-02 09:27:55.946 UTC [cauthdsl] func2 -> DEBU 12d6 0xc000b87db0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:27:55.946 UTC [cauthdsl] func1 -> DEBU 12d7 0xc000b87db0 gate 1556789275943020300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:27:55.948 UTC [policies] Evaluate -> DEBU 12da Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dc Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12de Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs"
orderer0.example.com | "2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12df Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs"
orderer0.example.com | "2019-05-02 09:27:55.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.2µs "
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]"
peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f4 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]"
peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f5 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]"
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]"
peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f7 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]"
peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f8 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]"
peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f9 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]"
peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Came out of wait. maxAvailaBlockNumber=[3]"
peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fb Remaining bytes=[4712], Going to peek [8] bytes"
peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fc Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}"
peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fd blockbytes [4710] read from file [0]"
peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [lockbasedtxmgr] Commit -> DEBU 10fe Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 10ff Preparing potential purge list working-set for expiringAtBlk [4]"
peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [leveldbhelper] GetIterator -> DEBU 1100 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1101 No expiry entry found for expiringAtBlk [4]"
peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [lockbasedtxmgr] func1 -> DEBU 1102 launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [kvledger] CommitWithPvtData -> DEBU 1103 [businesschannel] Committing block [3] transactions to history database"
orderer0.example.com | "2019-05-02 09:27:55.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.2µs "
orderer0.example.com | "2019-05-02 09:27:55.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:55.953 UTC [common.deliver] deliverBlocks -> DEBU 12e4 [channel: testchainid] Received seekInfo (0xc001056840) start:<specified:<number:1 > > stop:<specified:<number:1 > > from 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.955 UTC [fsblkstorage] Next -> DEBU 12e5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:27:55.955 UTC [fsblkstorage] newBlockfileStream -> DEBU 12e6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e7 Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e8 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:27:55.957 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e9 blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:27:55.957 UTC [common.deliver] deliverBlocks -> DEBU 12ea [channel: testchainid] Delivering block [1] for (0xc001056840) for 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.958 UTC [common.deliver] deliverBlocks -> DEBU 12eb [channel: testchainid] Done delivering to 172.18.0.8:57380 for (0xc001056840)"
orderer0.example.com | "2019-05-02 09:27:55.959 UTC [common.deliver] Handle -> DEBU 12ec Waiting for new SeekInfo from 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.960 UTC [common.deliver] Handle -> DEBU 12ed Attempting to read seek info message from 172.18.0.8:57380"
orderer0.example.com | "2019-05-02 09:27:55.967 UTC [common.deliver] Handle -> WARN 12ee Error reading from 172.18.0.8:57380: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:27:55.967 UTC [orderer.common.server] func1 -> DEBU 12ef Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:27:55.967 UTC [comm.grpc.server] 1 -> INFO 12f0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57380 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.582ms
orderer0.example.com | "2019-05-02 09:27:55.968 UTC [grpc] infof -> DEBU 12f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:27:56.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:56.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f3 Sending msg of 28 bytes to 3 on channel testchainid took 20µs"
orderer0.example.com | "2019-05-02 09:27:56.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs "
orderer0.example.com | "2019-05-02 09:27:56.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs"
orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs"
orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.9µs "
orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs "
orderer0.example.com | "2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fa Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fc Sending msg of 28 bytes to 3 on channel testchainid took 17µs"
orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs "
orderer0.example.com | "2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs"
orderer0.example.com | "2019-05-02 09:27:56.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146µs "
orderer0.example.com | "2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1300 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs"
orderer0.example.com | "2019-05-02 09:27:56.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1301 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:56.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1302 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5618ms "
orderer0.example.com | "2019-05-02 09:27:56.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1305 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs"
orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs "
orderer0.example.com | "2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1307 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs"
orderer0.example.com | "2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1308 Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs"
orderer0.example.com | "2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs "
orderer0.example.com | "2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs "
orderer0.example.com | "2019-05-02 09:27:57.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130e Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs"
orderer0.example.com | "2019-05-02 09:27:57.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.8µs "
orderer0.example.com | "2019-05-02 09:27:57.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1310 Sending msg of 28 bytes to 2 on channel businesschannel took 88.6µs"
orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 3 on channel businesschannel took 123.4µs"
orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.4µs "
orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1313 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs "
orderer0.example.com | "2019-05-02 09:27:57.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1314 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:57.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1315 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1316 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1317 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs"
orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs "
orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1319 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs"
orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs"
orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.4µs "
orderer0.example.com | "2019-05-02 09:27:58.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.1µs "
orderer0.example.com | "2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:58.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:58.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1320 Sending msg of 28 bytes to 3 on channel testchainid took 653.6µs"
orderer0.example.com | "2019-05-02 09:27:58.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 466µs "
orderer0.example.com | "2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1322 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs"
orderer0.example.com | "2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs"
orderer0.example.com | "2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.7µs "
orderer0.example.com | "2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1325 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238.9µs "
orderer0.example.com | "2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1326 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [historyleveldb] Commit -> DEBU 1104 Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [historyleveldb] Commit -> DEBU 1105 Channel [businesschannel]: Updates committed to history database for blockNo [3]"
peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [kvledger] CommitWithPvtData -> INFO 1106 [businesschannel] Committed block [3] with 1 transaction(s) in 25ms (state_validation=3ms block_commit=11ms state_commit=7ms)"
peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [transientstore] PurgeByTxids -> DEBU 1107 Purging private data from transient store for committed txids"
peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [leveldbhelper] GetIterator -> DEBU 1108 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]"
peer0.org1.example.com | "2019-05-02 09:27:30.047 UTC [common.deliver] deliverBlocks -> DEBU 1109 [channel: businesschannel] Delivering block [3] for (0xc002548140) for 172.18.0.8:57288"
peer0.org1.example.com | "2019-05-02 09:27:30.048 UTC [fsblkstorage] waitForBlock -> DEBU 110a Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]"
peer0.org1.example.com | "2019-05-02 09:27:30.049 UTC [msp.identity] Sign -> DEBU 110b Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020804 "
peer0.org1.example.com | "2019-05-02 09:27:30.051 UTC [msp.identity] Sign -> DEBU 110c Sign: digest: 555DD175376C5C862F5FCE28E73AB6235A6633F5F8516C9D10D185C54EC327CF "
peer0.org1.example.com | "2019-05-02 09:27:30.055 UTC [grpc] infof -> DEBU 110d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:30.055 UTC [common.deliver] deliverBlocks -> DEBU 110e Context canceled, aborting wait for next block"
peer0.org1.example.com | "2019-05-02 09:27:30.061 UTC [common.deliverevents] func1 -> DEBU 1110 Closing Deliver stream"
peer0.org1.example.com | "2019-05-02 09:27:30.061 UTC [comm.grpc.server] 1 -> INFO 1111 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:27:58.984Z grpc.peer_address=172.18.0.8:57288 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=1.0762516s
peer0.org1.example.com | "2019-05-02 09:27:30.056 UTC [grpc] infof -> DEBU 110f transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:30.063 UTC [fsblkstorage] waitForBlock -> DEBU 1112 Came out of wait. maxAvailaBlockNumber=[3]"
peer0.org1.example.com | "2019-05-02 09:27:30.064 UTC [gossip.state] commitBlock -> DEBU 1113 [businesschannel] Committed block [3] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:30.087 UTC [gossip.privdata] handleRequest -> DEBU 1114 Got GossipMessage: nonce:15262395124521686410 channel:"businesschannel" tag:CHAN_ONLY privateReq:<digests:<tx_id:"fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940" namespace:"_lifecycle" collection:"_implicit_org_Org1MSP" block_seq:3 > > , Envelope: 138 bytes, Signature: 0 bytes from 172.18.0.6:53224"
peer0.org1.example.com | "2019-05-02 09:27:30.088 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1115 Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}"
peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1116 Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}"
peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1117 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 1118 mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}"
peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1119 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]"
peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 111a Key no entry found. Returning nil"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111b constructing new query executor txid = [25e191a2-dd7b-4485-b7d0-66e54c985427]"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111c Done with transaction simulation / query execution [25e191a2-dd7b-4485-b7d0-66e54c985427]"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [gossip.privdata] filterNotEligible -> DEBU 111d Found 1 for TxID fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 , collection _implicit_org_Org1MSP for 172.18.0.6:53224"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111e constructing new query executor txid = [17b6749c-5c34-4adf-afe1-15daa1971483]"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111f Done with transaction simulation / query execution [17b6749c-5c34-4adf-afe1-15daa1971483]"
peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [msp] GetManagerForChain -> DEBU 1120 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:30.091 UTC [cauthdsl] func1 -> DEBU 1121 0xc002d97230 gate 1556789250091035300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1122 0xc002d97230 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1123 0xc002d97230 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1124 0xc002d97230 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1125 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1126 Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..|
peer0.org1.example.com | 00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.|
peer0.org1.example.com | 00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9|
peer0.org1.example.com | 00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F|
peer0.org1.example.com | 00000040 0a ba a5 ee ef 51 1b |.....Q.|"
peer0.org1.example.com | "2019-05-02 09:27:30.093 UTC [cauthdsl] func2 -> DEBU 1127 0xc002d97230 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:30.095 UTC [cauthdsl] func1 -> DEBU 1128 0xc002d97230 gate 1556789250091035300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:30.095 UTC [gossip.privdata] func1 -> DEBU 1129 Returning 172.18.0.6:53224 1 elements"
peer0.org1.example.com | "2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] Send -> DEBU 112c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 112f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1131 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.gossip] handleMessage -> DEBU 1132 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1130 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1133 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1134 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [gossip.comm] func1 -> DEBU 1135 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1136 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:32.290 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [msp] DeserializeIdentity -> DEBU 1138 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1139 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func1 -> DEBU 113f 0xc002e334d0 gate 1556789252292600400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1140 0xc002e334d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [msp] DeserializeIdentity -> DEBU 1141 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1143 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] Send -> DEBU 1144 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1145 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1146 Obtaining identity"
orderer0.example.com | "2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1327 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1328 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1329 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs"
orderer0.example.com | "2019-05-02 09:27:59.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs "
orderer0.example.com | "2019-05-02 09:27:59.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132b Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs"
orderer0.example.com | "2019-05-02 09:27:59.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 364.2µs "
orderer0.example.com | "2019-05-02 09:27:59.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.1µs "
orderer0.example.com | "2019-05-02 09:27:59.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132f Sending msg of 28 bytes to 3 on channel businesschannel took 65.4µs"
orderer0.example.com | "2019-05-02 09:27:59.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1331 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1332 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs"
orderer0.example.com | "2019-05-02 09:27:59.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1333 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.8µs "
orderer0.example.com | "2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1334 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs"
orderer0.example.com | "2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1335 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs"
orderer0.example.com | "2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.2µs "
orderer0.example.com | "2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1337 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs "
orderer0.example.com | "2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1338 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1339 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:00.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:00.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133b Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs"
orderer0.example.com | "2019-05-02 09:28:00.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.4µs "
orderer0.example.com | "2019-05-02 09:28:00.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133d Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs"
orderer0.example.com | "2019-05-02 09:28:00.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199.7µs "
orderer0.example.com | "2019-05-02 09:28:00.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:00.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1340 Sending msg of 28 bytes to 3 on channel businesschannel took 2.1559ms"
orderer0.example.com | "2019-05-02 09:28:00.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1341 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.8µs "
orderer0.example.com | "2019-05-02 09:28:00.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1342 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:01.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1343 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs"
orderer0.example.com | "2019-05-02 09:28:01.610 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1344 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs"
orderer0.example.com | "2019-05-02 09:28:01.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1345 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4561ms "
orderer0.example.com | "2019-05-02 09:28:01.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1346 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.3567ms "
orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1347 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1348 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1349 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs"
orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs "
orderer0.example.com | "2019-05-02 09:28:01.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1147 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1148 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1142 0xc002e334d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 1149 0xc002e334d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 114a 0xc002e334d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func1 -> DEBU 114b 0xc002e334d0 gate 1556789252292600400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 114f 0xc002e68b30 gate 1556789252294173000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1150 0xc002e68b30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1151 0xc002e68b30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1152 0xc002e68b30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1153 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1154 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1155 0xc002e68b30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 1156 0xc002e68b30 gate 1556789252294173000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1157 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1159 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 115a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115b Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.|
peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115c Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a|
peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~|
peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...|
peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......|
peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 115f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1160 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1161 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func1 -> DEBU 1162 0xc002f52230 gate 1556789252295636200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1163 0xc002f52230 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1164 0xc002f52230 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1165 0xc002f52230 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1166 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.|
peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|"
peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1167 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a|
peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~|
peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...|
peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......|
peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [cauthdsl] func2 -> DEBU 1168 0xc002f52230 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [cauthdsl] func1 -> DEBU 1169 0xc002f52230 gate 1556789252295636200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116a Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134d Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs"
orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs "
orderer0.example.com | "2019-05-02 09:28:01.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134f Sending msg of 28 bytes to 2 on channel businesschannel took 155.4µs"
orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1350 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs"
orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs "
orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1352 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.2µs "
orderer0.example.com | "2019-05-02 09:28:01.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1353 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:01.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1354 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1355 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1356 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs"
orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1357 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs "
orderer0.example.com | "2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1358 Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs"
orderer0.example.com | "2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1359 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs"
orderer0.example.com | "2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs "
orderer0.example.com | "2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs "
orderer0.example.com | "2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135f Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs"
orderer0.example.com | "2019-05-02 09:28:02.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1360 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.7µs "
orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1361 Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs"
orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1362 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs"
orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.4µs "
orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1364 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs "
orderer0.example.com | "2019-05-02 09:28:02.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1365 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:02.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1366 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1367 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1368 Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs"
orderer0.example.com | "2019-05-02 09:28:03.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1369 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs "
orderer0.example.com | "2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136a Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs"
orderer0.example.com | "2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs"
orderer0.example.com | "2019-05-02 09:28:03.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 490.6µs "
orderer0.example.com | "2019-05-02 09:28:03.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.8µs "
orderer0.example.com | "2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1370 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1371 Sending msg of 28 bytes to 3 on channel testchainid took 23µs"
orderer0.example.com | "2019-05-02 09:28:03.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.8µs "
orderer0.example.com | "2019-05-02 09:28:03.880 UTC [orderer.common.server] Deliver -> DEBU 1373 Starting new Deliver handler"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1171 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1172 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1173 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1174 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1175 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1176 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1177 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [policies] Evaluate -> DEBU 117a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func1 -> DEBU 117b 0xc003564460 gate 1556789252298199700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117c 0xc003564460 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117d 0xc003564460 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117e 0xc003564460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 117f 0xc003564460 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1180 0xc003564460 gate 1556789252298199700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1181 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1182 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1183 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1184 0xc003564ca0 gate 1556789252299791900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 1185 0xc003564ca0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1186 0xc003564ca0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1187 0xc003564ca0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1188 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...|
peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1189 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............|
peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..|
peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.|
peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[|
peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 118c 0xc003564ca0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func1 -> DEBU 118d 0xc003564ca0 gate 1556789252299791900 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1374 Starting new deliver loop for 172.18.0.8:57382"
orderer0.example.com | "2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1375 Attempting to read seek info message from 172.18.0.8:57382"
orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.server] Broadcast -> DEBU 1376 Starting new Broadcast handler"
orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] Handle -> DEBU 1377 Starting new broadcast loop for 172.18.0.8:57384"
orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1378 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57384"
orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1379 Processing config update message for channel businesschannel"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func1 -> DEBU 137f 0xc000380670 gate 1556789283896336900 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1380 0xc000380670 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1381 0xc000380670 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1382 0xc000380670 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1383 Verify: digest = 00000000 95 cd 8f e5 ed ef 6d d2 0f be f9 0d 55 50 9b 77 |......m.....UP.w|
orderer0.example.com | 00000010 1d d8 d3 ab 72 85 c8 22 da d0 40 e6 35 b4 0f 72 |....r.."..@.5..r|"
orderer0.example.com | "2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1384 Verify: sig = 00000000 30 44 02 20 2f ce f2 5a 3e 0c cf 74 8a 09 d9 a0 |0D. /..Z>..t....|
orderer0.example.com | 00000010 6b d5 9d b9 da 2b 99 1d f0 fd f8 d0 4c 7e 9d e6 |k....+......L~..|
orderer0.example.com | 00000020 20 17 7a 2c 02 20 6e 4a e3 b8 a6 ec bd 29 dc c7 | .z,. nJ.....)..|
orderer0.example.com | 00000030 49 c1 7e 43 5c 97 8e 99 e3 05 70 0b c6 9b 95 a3 |I.~C\.....p.....|
orderer0.example.com | 00000040 c8 33 4c 0e 94 c6 |.3L...|"
orderer0.example.com | "2019-05-02 09:28:03.897 UTC [cauthdsl] func2 -> DEBU 1385 0xc000380670 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:03.898 UTC [cauthdsl] func1 -> DEBU 1386 0xc000380670 gate 1556789283896336900 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1387 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1389 Signature set satisfies policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 138a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138d Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138e Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138f Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1390 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1391 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1392 Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1393 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1394 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1395 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1396 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1397 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1398 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1399 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139a Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139b Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139c Adding to config map: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 139f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a2 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a3 Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a4 Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a5 Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a6 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a7 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [policies] Evaluate -> DEBU 1190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1192 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.306 UTC [policies] Evaluate -> DEBU 1193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.306 UTC [msp.identity] Verify -> DEBU 1194 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:32.307 UTC [msp.identity] Verify -> DEBU 1195 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:32.307 UTC [msp] DeserializeIdentity -> DEBU 1196 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.307 UTC [msp] DeserializeIdentity -> DEBU 1197 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1198 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1199 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func1 -> DEBU 119e 0xc00362eb90 gate 1556789252312968100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 119f 0xc00362eb90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a0 0xc00362eb90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a1 0xc00362eb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [cauthdsl] func2 -> DEBU 11a2 0xc00362eb90 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00362eb90 gate 1556789252312968100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [policies] Evaluate -> DEBU 11a4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func1 -> DEBU 11a7 0xc00362f3d0 gate 1556789252315430500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a8 0xc00362f3d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a9 0xc00362f3d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [cauthdsl] func2 -> DEBU 11aa 0xc00362f3d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ab Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....|
peer0.org1.example.com | 00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|"
peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ac Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....|
peer0.org1.example.com | 00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..|
peer0.org1.example.com | 00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....|
peer0.org1.example.com | 00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.|
peer0.org1.example.com | 00000040 2f a1 74 57 4c d1 ef |/.tWL..|"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [cauthdsl] func2 -> DEBU 11ad 0xc00362f3d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [cauthdsl] func1 -> DEBU 11ae 0xc00362f3d0 gate 1556789252315430500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11af Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [msp] DeserializeIdentity -> DEBU 11b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11b9 0xc00378c4b0 gate 1556789252318517200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11ba 0xc00378c4b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bb 0xc00378c4b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bc 0xc00378c4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bd 0xc00378c4b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11be 0xc00378c4b0 gate 1556789252318517200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11c2 0xc00378ccf0 gate 1556789252318839500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11c3 0xc00378ccf0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c4 0xc00378ccf0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c5 0xc00378ccf0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c6 Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....|
peer0.org1.example.com | 00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c7 Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....|
peer0.org1.example.com | 00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..|
peer0.org1.example.com | 00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....|
peer0.org1.example.com | 00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.|
peer0.org1.example.com | 00000040 2f a1 74 57 4c d1 ef |/.tWL..|"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c8 0xc00378ccf0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func1 -> DEBU 11c9 0xc00378ccf0 gate 1556789252318839500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cc Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11ce Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11cf Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp] DeserializeIdentity -> DEBU 11d0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d1 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..|
peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d2 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..|
peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x|
peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..|
peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....|
peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.|
peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|"
peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.|
peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....|
peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......|
peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 |<Q_...G.o.t...|.|
peer0.org1.example.com | 00000040 27 34 a9 59 91 94 |'4.Y..|"
peer0.org1.example.com | "2019-05-02 09:27:32.321 UTC [msp] DeserializeIdentity -> DEBU 11d5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.321 UTC [msp] DeserializeIdentity -> DEBU 11d6 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:03.909 UTC [common.configtx] addToMap -> DEBU 13a8 Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:03.909 UTC [common.configtx] verifyDeltaSet -> DEBU 13a9 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13aa Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13ab Processing change to key: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] policyForItem -> DEBU 13ac Getting policy for item Application with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ad Manager Channel looking up path []"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ae Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13af Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b0 Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b1 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b2 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b3 Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b4 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b5 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins =="
orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:28:03.912 UTC [cauthdsl] deduplicate -> WARN 13b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | "2019-05-02 09:28:03.912 UTC [cauthdsl] func1 -> DEBU 13ba 0xc0004038f0 gate 1556789283912816400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bb 0xc0004038f0 signed by 0 principal evaluation starts (used [false false false])"
orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bc 0xc0004038f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bd 0xc0004038f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13be 0xc0004038f0 processing identity 1 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.913 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13bf Checking if identity satisfies ADMIN role for Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.914 UTC [cauthdsl] func2 -> DEBU 13c0 0xc0004038f0 principal matched by identity 1"
orderer0.example.com | "2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c1 Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."|
orderer0.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|"
orderer0.example.com | "2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c2 Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..|
orderer0.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#|
orderer0.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..|
orderer0.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k|
orderer0.example.com | 00000040 a3 af 89 d2 b2 af |......|"
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] func2 -> DEBU 13c3 0xc0004038f0 principal evaluation succeeds for identity 1"
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0004038f0 gate 1556789283912816400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c5 Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] deduplicate -> WARN 13c8 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func1 -> DEBU 13c9 0xc00041cd20 gate 1556789283915990600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13ca 0xc00041cd20 signed by 0 principal evaluation starts (used [false false false])"
orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cb 0xc00041cd20 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.916 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13cc Checking if identity satisfies ADMIN role for Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cd 0xc00041cd20 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13ce Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.|
orderer0.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|"
orderer0.example.com | "2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13cf Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.|
orderer0.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..|
orderer0.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.|
orderer0.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N..<cu)/.a5....|
orderer0.example.com | 00000040 d4 0a 92 0d 83 df 89 |.......|"
orderer0.example.com | "2019-05-02 09:28:03.917 UTC [cauthdsl] func2 -> DEBU 13d0 0xc00041cd20 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:03.917 UTC [cauthdsl] func1 -> DEBU 13d1 0xc00041cd20 gate 1556789283915990600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d4 Signature set satisfies policy /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:03.918 UTC [common.configtx] verifyDeltaSet -> DEBU 13d6 Processing change to key: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13da Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13db Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dc Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dd Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13de Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13df Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e0 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e1 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e2 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e3 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e4 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e5 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e6 Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e7 Setting policy for key LifecycleEndorsement to "
orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e8 Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13e9 Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ea Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13eb Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ec Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ed Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ee Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ef Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f0 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f1 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f2 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f3 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f4 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] NewStandardValues -> DEBU 13f5 Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f6 Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f7 Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f8 Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f9 Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fa Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] NewStandardValues -> DEBU 13fb Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fc Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fd Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 13fe Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13ff Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 1400 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1401 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] Validate -> DEBU 1402 Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] validateMSP -> DEBU 1403 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] newBccspMsp -> DEBU 1404 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:27:32.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d8 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d9 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [policies] Evaluate -> DEBU 11dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func1 -> DEBU 11dd 0xc003887640 gate 1556789252323396900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11de 0xc003887640 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11df 0xc003887640 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e0 0xc003887640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e1 0xc003887640 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func1 -> DEBU 11e2 0xc003887640 gate 1556789252323396900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003887e80 gate 1556789252325216600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003887e80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003887e80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003887e80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11ea Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......|
peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11eb Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.|
peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}|
peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"|
peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...|
peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11ec 0xc003887e80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11ed 0xc003887e80 gate 1556789252325216600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f0 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11fa 0xc000449650 gate 1556789252326582400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fb 0xc000449650 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fc 0xc000449650 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fd 0xc000449650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fe 0xc000449650 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11ff 0xc000449650 gate 1556789252326582400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1200 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1201 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 1202 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 1203 0xc000449e90 gate 1556789252327069100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1204 0xc000449e90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1205 0xc000449e90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1206 0xc000449e90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1207 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.|
peer0.org1.example.com | 00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1208 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.|
peer0.org1.example.com | 00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.|
peer0.org1.example.com | 00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.|
peer0.org1.example.com | 00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..|
peer0.org1.example.com | 00000040 1b 29 54 54 6f c7 |.)TTo.|"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1209 0xc000449e90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 120a 0xc000449e90 gate 1556789252327069100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp] DeserializeIdentity -> DEBU 120f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1211 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 1215 0xc002292f70 gate 1556789252328448600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1216 0xc002292f70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1217 0xc002292f70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1218 0xc002292f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1219 0xc002292f70 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 121a 0xc002292f70 gate 1556789252328448600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 121d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 121e 0xc0022937b0 gate 1556789252329126400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 121f 0xc0022937b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1220 0xc0022937b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1221 0xc0022937b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1222 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.|
orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] New -> DEBU 1405 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] Setup -> DEBU 1406 Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.929 UTC [msp.identity] newIdentity -> DEBU 1407 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.930 UTC [msp.identity] newIdentity -> DEBU 1408 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1409 Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] Validate -> DEBU 140a MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] getCertificationChain -> DEBU 140b MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [msp] hasOURole -> DEBU 140c MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [msp] getCertificationChain -> DEBU 140d MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 140e Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140f Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 1410 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1411 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:03.933 UTC [common.channelconfig] Validate -> DEBU 1412 Anchor peers for org Org3MSP are "
orderer0.example.com | "2019-05-02 09:28:03.933 UTC [common.channelconfig] validateMSP -> DEBU 1413 Setting up MSP for org Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] newBccspMsp -> DEBU 1414 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] New -> DEBU 1415 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] Setup -> DEBU 1416 Setting up MSP instance Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1417 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB
orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc
orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1418 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y
orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr
orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky
orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV
orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO
orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ
orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI=
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.935 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1419 Checking if identity satisfies role [CLIENT] for Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.935 UTC [msp] Validate -> DEBU 141a MSP Org3MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141b MSP Org3MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] hasOURole -> DEBU 141c MSP Org3MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141d MSP Org3MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:03.936 UTC [common.channelconfig] NewStandardValues -> DEBU 141e Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141f Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] NewStandardValues -> DEBU 1420 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1421 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] Validate -> DEBU 1422 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] validateMSP -> DEBU 1423 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [msp] newBccspMsp -> DEBU 1424 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.937 UTC [msp] New -> DEBU 1425 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.938 UTC [msp] Setup -> DEBU 1426 Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.938 UTC [msp.identity] newIdentity -> DEBU 1427 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.939 UTC [msp.identity] newIdentity -> DEBU 1428 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.940 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1429 Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.940 UTC [msp] Validate -> DEBU 142a MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142b MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] hasOURole -> DEBU 142c MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142d MSP Org1MSP getting certification chain"
peer0.org1.example.com | 00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1223 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.|
peer0.org1.example.com | 00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.|
peer0.org1.example.com | 00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.|
peer0.org1.example.com | 00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..|
peer0.org1.example.com | 00000040 1b 29 54 54 6f c7 |.)TTo.|"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1224 0xc0022937b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 1225 0xc0022937b0 gate 1556789252329126400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1227 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1228 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.330 UTC [gossip.gossip] handleMessage -> DEBU 122a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] IsLeader -> DEBU 122c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510041801 "
peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122e Sign: digest: 864F29BEC3ACAE39E159EED5D13065DB3737E923A6DDBF2781A5C0282EDBEEEE "
peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1231 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1232 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1233 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] Send -> DEBU 1234 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1235 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1236 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1237 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1238 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.509 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1239 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 123a Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [cauthdsl] func1 -> DEBU 123e 0xc0025772a0 gate 1556789252510380400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [cauthdsl] func2 -> DEBU 123f 0xc0025772a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1240 0xc0025772a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1241 0xc0025772a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 68 4c fb e1 65 a3 a9 50 e0 5d 39 be 9c a3 ed 6f |hL..e..P.]9....o|
peer0.org1.example.com | 00000010 e5 d2 ba 78 c7 6e 22 41 c7 4f 22 6e 0c 7a e2 a3 |...x.n"A.O"n.z..|"
peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 69 4d 83 33 12 ee 44 57 8a ac ff 0b |0D. iM.3..DW....|
peer0.org1.example.com | 00000010 20 7d 03 9c 5b fe b9 35 b1 92 87 47 be ca 4a 0d | }..[..5...G..J.|
peer0.org1.example.com | 00000020 53 09 41 d9 02 20 45 70 ec 86 66 80 d9 cc de af |S.A.. Ep..f.....|
peer0.org1.example.com | 00000030 42 90 b9 18 dd 19 6c 1f 0f d3 da 9a 72 87 c0 aa |B.....l.....r...|
peer0.org1.example.com | 00000040 40 bd e4 c9 1d 66 |@....f|"
peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [cauthdsl] func2 -> DEBU 1244 0xc0025772a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [cauthdsl] func1 -> DEBU 1245 0xc0025772a0 gate 1556789252510380400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:32.516 UTC [blocksProvider] DeliverBlocks -> DEBU 124a [businesschannel] Adding payload to local buffer, blockNum = [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124b [businesschannel] Adding payload to local buffer, blockNum = [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124c Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [blocksProvider] DeliverBlocks -> DEBU 124d [businesschannel] Gossiping block [4], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.channel] AddToMsgStore -> DEBU 124e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.pull] Add -> DEBU 124f Added 4, total items: 4"
peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1250 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] NewStandardValues -> DEBU 142e Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142f Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1430 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1431 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1432 Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1433 Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1434 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1435 Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1436 Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1437 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1438 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:03.943 UTC [common.channelconfig] validateMSP -> DEBU 1439 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.943 UTC [msp] newBccspMsp -> DEBU 143a Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.943 UTC [msp] New -> DEBU 143b Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:03.944 UTC [msp] Setup -> DEBU 143c Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:28:03.944 UTC [msp.identity] newIdentity -> DEBU 143d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.945 UTC [msp.identity] newIdentity -> DEBU 143e Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Validate -> DEBU 143f MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1440 Setting up the MSP manager (4 msps)"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1441 MSP manager setup complete, setup 4 msps"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1442 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1443 Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1444 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1445 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1446 Proposed new policy Writers for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1447 Proposed new policy Admins for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1448 Proposed new policy Endorsement for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 1449 Proposed new policy Readers for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144a Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144b Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144c Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144d Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144e Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144f Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1450 Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1451 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1452 Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1453 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs"
orderer0.example.com | "2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.9µs "
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.7µs "
orderer0.example.com | "2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1458 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1459 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145a Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145b Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145c Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145d Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145e Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145f Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1460 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1461 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1462 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1463 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1464 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1468 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1478 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1479 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1251 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> INFO 1252 [businesschannel] Received block [4] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> DEBU 1253 [businesschannel] Validating block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1254 [businesschannel] START Block Validation for block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1255 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] validateTx -> DEBU 1256 [businesschannel] validateTx starts for block 0xc0030e2340 env 0xc002e393b0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [protoutils] ValidateTransaction -> DEBU 1257 ValidateTransactionEnvelope starts for envelope 0xc002e393b0"
peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] ValidateTransaction -> DEBU 1258 Header is channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" "
peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] validateChannelHeader -> DEBU 1259 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] checkSignatureFromCreator -> DEBU 125a begin"
peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp] GetManagerForChain -> DEBU 125b Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp] DeserializeIdentity -> DEBU 125c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp.identity] newIdentity -> DEBU 125d Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 125e creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}"
peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [msp] Validate -> DEBU 125f MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [msp] getCertificationChain -> DEBU 1260 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1261 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1262 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...|
peer0.org1.example.com | 00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|"
peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1263 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T|
peer0.org1.example.com | 00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....|
peer0.org1.example.com | 00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. |
peer0.org1.example.com | 00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.|
peer0.org1.example.com | 00000040 91 85 a0 fa 29 4d |....)M|"
peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1264 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1265 validateEndorserTransaction starts for data 0xc002ea0000, header channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" "
peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1266 validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1267 validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [protoutils] ValidateTransaction -> DEBU 1268 ValidateTransactionEnvelope returns err %!s(<nil>)"
peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 1269 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 126a retrieveTransactionByID() - txId = [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd]"
peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 126b Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:32.528 UTC [committer.txvalidator] Dispatch -> DEBU 126c [businesschannel] Dispatch starts for bytes 0xc002e14000"
peer0.org1.example.com | "2019-05-02 09:27:32.528 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 126d constructing new query executor txid = [39a75287-65c7-4891-a529-ad2e91f2f4cf]"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 126e Done with transaction simulation / query execution [39a75287-65c7-4891-a529-ad2e91f2f4cf]"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 126f Validating Tx fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147b Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147c Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147d Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147e Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1270 constructing new query executor txid = [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1271 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1272 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 1273 Done with transaction simulation / query execution [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]"
peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1274 constructing new query executor txid = [5c072d0a-d7ec-4837-96e8-ef7bf252489d]"
peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] Done -> DEBU 1275 Done with transaction simulation / query execution [5c072d0a-d7ec-4837-96e8-ef7bf252489d]"
peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement =="
peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [cauthdsl] func1 -> DEBU 1277 0xc00313e930 gate 1556789252530857800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1278 0xc00313e930 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1279 0xc00313e930 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 127a 0xc00313e930 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127b Verify: digest = 00000000 59 27 5d c2 6d 27 9c 6b f4 ca 4f 2d 33 7a b3 b2 |Y'].m'.k..O-3z..|
peer0.org1.example.com | 00000010 1d 44 cb 41 64 c9 b1 4b 4e ff 37 82 e8 5a 8b 47 |.D.Ad..KN.7..Z.G|"
peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127c Verify: sig = 00000000 30 44 02 20 53 34 c0 6c e1 74 af 1f 73 8d 3d c8 |0D. S4.l.t..s.=.|
peer0.org1.example.com | 00000010 5d 09 a9 19 d1 b3 ca 3e d2 23 15 63 01 2f d3 2c |]......>.#.c./.,|
peer0.org1.example.com | 00000020 96 da 17 3c 02 20 71 7b ee a2 39 c5 b0 78 71 c3 |...<. q{..9..xq.|
peer0.org1.example.com | 00000030 3d 35 05 fc 45 d3 49 9b a6 29 4a 0b 9a 93 d6 21 |=5..E.I..)J....!|
peer0.org1.example.com | 00000040 fc 6a 01 f5 6d d6 |.j..m.|"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [cauthdsl] func2 -> DEBU 127d 0xc00313e930 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [cauthdsl] func1 -> DEBU 127e 0xc00313e930 gate 1556789252530857800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1281 constructing new query executor txid = [c2f77205-d7b6-4f22-8985-c5b15a1f8384]"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1282 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1283 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] Done -> DEBU 1284 Done with transaction simulation / query execution [c2f77205-d7b6-4f22-8985-c5b15a1f8384]"
peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1285 constructing new query executor txid = [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]"
peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1286 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1287 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] Done -> DEBU 1288 Done with transaction simulation / query execution [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]"
peer0.org1.example.com | "2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1289 constructing new query executor txid = [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]"
peer0.org1.example.com | "2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1291 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1292 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1294 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] Done -> DEBU 1295 Done with transaction simulation / query execution [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147f Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1480 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1481 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1482 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1483 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1484 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1485 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1486 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1487 Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1488 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1489 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148a Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148b Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148c Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148d Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148e Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148f Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 1490 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1491 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1492 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1493 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1494 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1495 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1496 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1497 As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1498 As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 1499 Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 149a Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149b Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149c Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149d Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149e Manager Channel/Application has managers Org3MSP"
orderer0.example.com | "2019-05-02 09:28:03.959 UTC [policies] Manager -> DEBU 149f Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a0 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a1 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a2 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a3 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a4 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a5 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a6 Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a7 Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:03.961 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a8 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14a9 Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14aa Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ab Sign: plaintext: 0AD2060A1B08011A0608A3F0AAE60522...8E99E305700BC69B95A3C8334C0E94C6 "
orderer0.example.com | "2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ac Sign: digest: EE16CDA5D421246768817D036E9C38EFE9007FA05B3109E4F22AC3F48C3F33F6 "
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [msp] DeserializeIdentity -> DEBU 14b2 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:03.963 UTC [msp.identity] newIdentity -> DEBU 14b3 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
peer0.org1.example.com | "2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1296 constructing new query executor txid = [e47bebb9-396b-47ba-8ea5-a374711bdc94]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1297 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1298 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 1299 Done with transaction simulation / query execution [e47bebb9-396b-47ba-8ea5-a374711bdc94]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 129a constructing new query executor txid = [acc501dc-251f-4568-ad6e-1ffa097d3d4c]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 129d Done with transaction simulation / query execution [acc501dc-251f-4568-ad6e-1ffa097d3d4c]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [vscc] Validate -> DEBU 129e block 4, namespace: _lifecycle, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 129f Transaction fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] Dispatch -> DEBU 12a0 [businesschannel] Dispatch completes env bytes 0xc002e14000"
peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> DEBU 12a1 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> INFO 12a2 [businesschannel] Validated block [4] in 21ms"
peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12a3 constructing new query executor txid = [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]"
peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] Done -> DEBU 12a4 Done with transaction simulation / query execution [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]"
peer0.org1.example.com | "2019-05-02 09:27:32.541 UTC [msp] GetManagerForChain -> DEBU 12a5 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:32.541 UTC [cauthdsl] func1 -> DEBU 12a6 0xc002e138c0 gate 1556789252541101200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a7 0xc002e138c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a8 0xc002e138c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a9 0xc002e138c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [cauthdsl] func2 -> DEBU 12aa 0xc002e138c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [cauthdsl] func1 -> DEBU 12ab 0xc002e138c0 gate 1556789252541101200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [gossip.privdata] isEligible -> DEBU 12ac Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] inspectTransaction -> DEBU 12ad Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc002e11da0), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc0034acdb0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping."
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] listMissingPrivateData -> DEBU 12ae Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] StoreBlock -> DEBU 12af [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [kvledger] CommitWithPvtData -> DEBU 12b0 [businesschannel] Validating state for block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b1 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b2 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b3 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b4 ValidateAndPrepareBatch() for block number = [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b5 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] preprocessProtoBlock -> DEBU 12b6 txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [statebasedval] validateKVRead -> DEBU 12b8 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12ba GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 12bb Block [4] Transaction index [0] TxId [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] marked as valid by state validator. ContainsPostOrderWrites [false]"
orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
orderer0.example.com | QQ==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:03.964 UTC [cauthdsl] func1 -> DEBU 14b4 0xc000d00e90 gate 1556789283964332300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.964 UTC [cauthdsl] func2 -> DEBU 14b5 0xc000d00e90 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b6 0xc000d00e90 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b7 0xc000d00e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b8 0xc000d00e90 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func1 -> DEBU 14b9 0xc000d00e90 gate 1556789283964332300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.966 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func1 -> DEBU 14bd 0xc000d01fd0 gate 1556789283966118500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14be 0xc000d01fd0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14bf 0xc000d01fd0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14c0 0xc000d01fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [cauthdsl] func2 -> DEBU 14c1 0xc000d01fd0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [cauthdsl] func1 -> DEBU 14c2 0xc000d01fd0 gate 1556789283966118500 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] func1 -> DEBU 14c5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c6 Signature set did not satisfy policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func1 -> DEBU 14cb 0xc000f40ce0 gate 1556789283968350700 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cc 0xc000f40ce0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cd 0xc000f40ce0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:03.968 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14ce Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:28:03.969 UTC [msp] Validate -> DEBU 14cf MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:28:03.969 UTC [cauthdsl] func2 -> DEBU 14d0 0xc000f40ce0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:03.969 UTC [msp.identity] Verify -> DEBU 14d1 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.|
orderer0.example.com | 00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|"
orderer0.example.com | "2019-05-02 09:28:03.970 UTC [msp.identity] Verify -> DEBU 14d2 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..|
orderer0.example.com | 00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q|
orderer0.example.com | 00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&|
orderer0.example.com | 00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y|
orderer0.example.com | 00000040 9b 10 bb ec fa 93 92 |.......|"
orderer0.example.com | "2019-05-02 09:28:03.970 UTC [cauthdsl] func2 -> DEBU 14d3 0xc000f40ce0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [cauthdsl] func1 -> DEBU 14d4 0xc000f40ce0 gate 1556789283968350700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d7 Signature set satisfies policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d9 Signature set satisfies policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:03.972 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14db [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57384"
orderer0.example.com | "2019-05-02 09:28:03.972 UTC [orderer.consensus.etcdraft] propose -> INFO 14dc Created block [9], there are 0 blocks in flight" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 14dd Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] 2 -> DEBU 14de Proposed block [9] to raft consensus" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.broadcast] Handle -> WARN 14df Error reading from 172.18.0.8:57384: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e0 Closing Broadcast stream"
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57384 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=81.2501ms
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [common.deliver] Handle -> WARN 14e3 Error reading from 172.18.0.8:57382: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e4 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57382 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=95.981ms
orderer0.example.com | "2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 33999 bytes to 2 on channel businesschannel took 20.1µs"
orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e8 Sending msg of 33999 bytes to 3 on channel businesschannel took 23.2µs"
orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e9 Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer2.example.com(orderer2.example.com:7050) took 217.2µs "
orderer0.example.com | "2019-05-02 09:28:03.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ea Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer1.example.com(orderer1.example.com:7050) took 127.3µs "
orderer0.example.com | "2019-05-02 09:28:03.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14eb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ec Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs"
orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ed Sending msg of 28 bytes to 3 on channel businesschannel took 122µs"
orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs "
orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 14ef Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1
orderer0.example.com | "2019-05-02 09:28:03.990 UTC [common.configtx] addToMap -> DEBU 14f0 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f1 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:03.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f3 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f5 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f6 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:04.012 UTC [common.configtx] addToMap -> DEBU 14f7 Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.014 UTC [common.configtx] addToMap -> DEBU 14fa Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:03.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs "
orderer0.example.com | "2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.015 UTC [common.configtx] addToMap -> DEBU 14fb Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.016 UTC [common.configtx] addToMap -> DEBU 14fc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fd Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fe Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 14ff Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valinternal] ApplyWriteSet -> DEBU 12bc txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0030e2d40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0030e2e00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0030e2cc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0030e2d00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc0030e2dc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0030e2d80)}"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12bd validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12be postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12bf ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c0 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>,O<><4F>z<0E><><EFBFBD>q<EFBFBD>{<7B><>:<3A>1oS'<27>w? <0B><><EFBFBD>j<EFBFBD><6A>:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleStateUpdates -> DEBU 12c1 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 12c2 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c3 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c4 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}"
peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [confighistory] HandleStateUpdates -> ERRO 12c5 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003770140)}"
peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c6 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}"
peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [kvledger] CommitWithPvtData -> DEBU 12c7 [businesschannel] Committing block [4] to storage"
peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [ledgerstorage] CommitWithPvtData -> DEBU 12c8 Writing block [4] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12c9 constructing new query executor txid = [998036b2-24f2-4003-aed9-57d7cb5f0fe7]"
peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] Done -> DEBU 12ca Done with transaction simulation / query execution [998036b2-24f2-4003-aed9-57d7cb5f0fe7]"
peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] validateTx -> DEBU 12cb [businesschannel] validateTx completes for block 0xc0030e2340 env 0xc002e393b0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:32.550 UTC [pvtdatastorage] Prepare -> DEBU 12cc Saved 0 private data write sets for block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cd Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets=
peer0.org1.example.com | txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12ce Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cf Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx number:[0] ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:32.559 UTC [fsblkstorage] updateCheckpoint -> DEBU 12d0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80794], isChainEmpty=[false], lastBlockNumber=[4]"
orderer0.example.com | "2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150b Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:04.027 UTC [common.configtx] addToMap -> DEBU 150c Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150e Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:04.029 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:04.029 UTC [common.configtx] verifyDeltaSet -> DEBU 1510 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1511 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1512 Processing change to key: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1513 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1514 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1515 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.035 UTC [common.configtx] verifyDeltaSet -> DEBU 1516 Processing change to key: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.036 UTC [common.configtx] policyForItem -> DEBU 1517 Getting policy for item Application with mod_policy Admins"
orderer0.example.com | "2019-05-02 09:28:04.038 UTC [policies] Manager -> DEBU 1518 Manager Channel looking up path []"
orderer0.example.com | "2019-05-02 09:28:04.041 UTC [policies] Manager -> DEBU 1519 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151a Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151b Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151c Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151d Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151e Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 151f Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 1520 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.045 UTC [policies] Evaluate -> DEBU 1521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins =="
orderer0.example.com | "2019-05-02 09:28:04.047 UTC [policies] Evaluate -> DEBU 1522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:04.048 UTC [policies] Evaluate -> DEBU 1523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
orderer0.example.com | "2019-05-02 09:28:04.048 UTC [cauthdsl] deduplicate -> WARN 1524 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | "2019-05-02 09:28:04.056 UTC [cauthdsl] func1 -> DEBU 1525 0xc001284ab0 gate 1556789284056859400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1526 0xc001284ab0 signed by 0 principal evaluation starts (used [false false false])"
orderer0.example.com | "2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1527 0xc001284ab0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:04.060 UTC [cauthdsl] func2 -> DEBU 1528 0xc001284ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
orderer0.example.com | "2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 1529 0xc001284ab0 processing identity 1 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 152a 0xc001284ab0 principal matched by identity 1"
orderer0.example.com | "2019-05-02 09:28:04.062 UTC [msp.identity] Verify -> DEBU 152b Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."|
orderer0.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|"
orderer0.example.com | "2019-05-02 09:28:04.065 UTC [msp.identity] Verify -> DEBU 152c Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..|
orderer0.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#|
orderer0.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..|
orderer0.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k|
orderer0.example.com | 00000040 a3 af 89 d2 b2 af |......|"
orderer0.example.com | "2019-05-02 09:28:04.066 UTC [cauthdsl] func2 -> DEBU 152d 0xc001284ab0 principal evaluation succeeds for identity 1"
orderer0.example.com | "2019-05-02 09:28:04.071 UTC [cauthdsl] func1 -> DEBU 152e 0xc001284ab0 gate 1556789284056859400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:04.071 UTC [policies] Evaluate -> DEBU 152f Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1530 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1531 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
orderer0.example.com | "2019-05-02 09:28:04.074 UTC [cauthdsl] deduplicate -> WARN 1532 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
orderer0.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 1533 0xc0012850e0 gate 1556789284075081800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 1534 0xc0012850e0 signed by 0 principal evaluation starts (used [false false false])"
orderer0.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1535 0xc0012850e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1536 0xc0012850e0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1537 Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.|
orderer0.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|"
orderer0.example.com | "2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1538 Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.|
orderer0.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..|
orderer0.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.|
orderer0.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N..<cu)/.a5....|
orderer0.example.com | 00000040 d4 0a 92 0d 83 df 89 |.......|"
orderer0.example.com | "2019-05-02 09:28:04.080 UTC [cauthdsl] func2 -> DEBU 1539 0xc0012850e0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:04.080 UTC [cauthdsl] func1 -> DEBU 153a 0xc0012850e0 gate 1556789284075081800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:04.080 UTC [policies] Evaluate -> DEBU 153b Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153d Signature set satisfies policy /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 153f Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 1540 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.095 UTC [common.configtx] recurseConfigMap -> DEBU 1541 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1542 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1543 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1544 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1545 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1546 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1547 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.099 UTC [common.configtx] recurseConfigMap -> DEBU 1548 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 1549 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154a Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154b Setting policy for key Writers to "
orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154c Setting policy for key Admins to "
orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154d Setting policy for key Endorsement to "
orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154e Setting policy for key LifecycleEndorsement to "
orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154f Setting policy for key Readers to "
orderer0.example.com | "2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1550 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1551 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.104 UTC [common.configtx] recurseConfigMap -> DEBU 1552 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1553 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1554 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1555 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1556 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] NewStandardValues -> DEBU 155a Initializing protos for *channelconfig.ChannelProtos"
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155b Processing field: HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155c Processing field: BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155d Processing field: OrdererAddresses"
orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155e Processing field: Consortium"
orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155f Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1560 Initializing protos for *channelconfig.ApplicationProtos"
orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1561 Processing field: ACLs"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1562 Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1563 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1564 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1565 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1566 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] Validate -> DEBU 1567 Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] validateMSP -> DEBU 1568 Setting up MSP for org Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] newBccspMsp -> DEBU 1569 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] New -> DEBU 156a Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] Setup -> DEBU 156b Setting up MSP instance Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp.identity] newIdentity -> DEBU 156c Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.119 UTC [msp.identity] newIdentity -> DEBU 156d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 156e Checking if identity satisfies role [CLIENT] for Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] Validate -> DEBU 156f MSP Org2MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] getCertificationChain -> DEBU 1570 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.121 UTC [msp] hasOURole -> DEBU 1571 MSP Org2MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:04.121 UTC [msp] getCertificationChain -> DEBU 1572 MSP Org2MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1573 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1575 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1576 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:04.127 UTC [common.channelconfig] Validate -> DEBU 1577 Anchor peers for org Org3MSP are "
orderer0.example.com | "2019-05-02 09:28:04.127 UTC [common.channelconfig] validateMSP -> DEBU 1578 Setting up MSP for org Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.129 UTC [msp] newBccspMsp -> DEBU 1579 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.129 UTC [msp] New -> DEBU 157a Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 157b Setting up MSP instance Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.135 UTC [msp.identity] newIdentity -> DEBU 157c Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB
orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw
orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc
orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp.identity] newIdentity -> DEBU 157d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y
orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr
orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky
orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV
orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO
orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ
peer0.org1.example.com | "2019-05-02 09:27:32.568 UTC [pvtdatastorage] Commit -> DEBU 12d1 Committing private data for block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtdatastorage] Commit -> DEBU 12d2 Committed private data for block [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [kvledger] CommitWithPvtData -> DEBU 12d3 [businesschannel] Committing block [4] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d4 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d5 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d6 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d7 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d8 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d9 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]"
peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12da Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12db Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12dc Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [lockbasedtxmgr] Commit -> DEBU 12dd Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12de Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12df Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]"
peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]"
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] Commit -> DEBU 12e4 Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12e5 Preparing potential purge list working-set for expiringAtBlk [5]"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] func1 -> DEBU 12e6 launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [kvledger] CommitWithPvtData -> DEBU 12e7 [businesschannel] Committing block [4] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [historyleveldb] Commit -> DEBU 12e8 Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [leveldbhelper] GetIterator -> DEBU 12e9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:32.592 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12ea No expiry entry found for expiringAtBlk [5]"
peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [historyleveldb] Commit -> DEBU 12eb Channel [businesschannel]: Updates committed to history database for blockNo [4]"
peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [kvledger] CommitWithPvtData -> INFO 12ec [businesschannel] Committed block [4] with 1 transaction(s) in 50ms (state_validation=1ms block_commit=37ms state_commit=7ms)"
peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ed Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020805 "
peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ee Sign: digest: 0820A4F8A9A920346EFDE259113FB688CD3C1B3AF119364D48D5269BDEF9ED35 "
peer0.org1.example.com | "2019-05-02 09:27:32.597 UTC [gossip.state] commitBlock -> DEBU 12ef [businesschannel] Committed block [4] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6055570764437907544 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.pull] HandleMessage -> DEBU 12f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6055570764437907544 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.pull] SendDigest -> DEBU 12f2 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [gossip.gossip] handleMessage -> DEBU 12f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [gossip.gossip] handleMessage -> DEBU 12f8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12f9 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.|
peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|"
peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12fa Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a|
peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~|
peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...|
peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......|
peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|"
peer0.org1.example.com | "2019-05-02 09:27:32.639 UTC [msp] DeserializeIdentity -> DEBU 12fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.639 UTC [gossip.gossip] handleMessage -> DEBU 12fc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 12fd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12fe Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.|
peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|"
peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12ff Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a|
peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~|
peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...|
peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......|
peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|"
peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 1300 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [gossip.comm] func1 -> DEBU 1301 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [gossip.gossip] handleMessage -> DEBU 1302 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1303 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.|
peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|"
peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1304 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a|
peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~|
peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...|
peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......|
peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|"
peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp] DeserializeIdentity -> DEBU 1305 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.648 UTC [gossip.gossip] handleMessage -> DEBU 1306 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 1307 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1308 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1309 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 130b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.800 UTC [gossip.gossip] handleMessage -> DEBU 130c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.801 UTC [msp] DeserializeIdentity -> DEBU 130d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [gossip.comm] func1 -> DEBU 130e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 130f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1310 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1311 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 1315 0xc002d61f20 gate 1556789252807208600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1316 0xc002d61f20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1317 0xc002d61f20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1318 0xc002d61f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1319 0xc002d61f20 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131a 0xc002d61f20 gate 1556789252807208600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131e 0xc0030fe760 gate 1556789252807694400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 131f 0xc0030fe760 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1320 0xc0030fe760 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1321 0xc0030fe760 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1322 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1323 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func2 -> DEBU 1324 0xc0030fe760 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1325 0xc0030fe760 gate 1556789252807694400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1326 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1327 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1328 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1329 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132d Got reader policy for channel [businesschannel] with flag [true]"
orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI=
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 157e Checking if identity satisfies role [CLIENT] for Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] Validate -> DEBU 157f MSP Org3MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] getCertificationChain -> DEBU 1580 MSP Org3MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] hasOURole -> DEBU 1581 MSP Org3MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] getCertificationChain -> DEBU 1582 MSP Org3MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.ApplicationOrgProtos"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1585 Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1586 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] Validate -> DEBU 1587 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] validateMSP -> DEBU 1588 Setting up MSP for org Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] newBccspMsp -> DEBU 1589 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] New -> DEBU 158a Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] Setup -> DEBU 158b Setting up MSP instance Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158c Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158d Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 158e Checking if identity satisfies role [CLIENT] for Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] Validate -> DEBU 158f MSP Org1MSP validating identity"
orderer0.example.com | "2019-05-02 09:28:04.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1590 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1591 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs"
orderer0.example.com | "2019-05-02 09:28:04.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1592 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.1µs "
orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] getCertificationChain -> DEBU 1593 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.200 UTC [msp] hasOURole -> DEBU 1594 MSP Org1MSP checking if the identity is a client"
orderer0.example.com | "2019-05-02 09:28:04.200 UTC [msp] getCertificationChain -> DEBU 1595 MSP Org1MSP getting certification chain"
orderer0.example.com | "2019-05-02 09:28:04.200 UTC [common.channelconfig] NewStandardValues -> DEBU 1596 Initializing protos for *channelconfig.OrdererProtos"
orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1597 Processing field: ConsensusType"
orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1598 Processing field: BatchSize"
orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1599 Processing field: BatchTimeout"
orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159a Processing field: KafkaBrokers"
orderer0.example.com | "2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159b Processing field: ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159c Processing field: Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159d Initializing protos for *channelconfig.OrdererOrgProtos"
orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159e Processing field: Endpoints"
orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159f Initializing protos for *channelconfig.OrganizationProtos"
orderer0.example.com | "2019-05-02 09:28:04.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a0 Processing field: MSP"
orderer0.example.com | "2019-05-02 09:28:04.209 UTC [common.channelconfig] validateMSP -> DEBU 15a1 Setting up MSP for org OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.209 UTC [msp] newBccspMsp -> DEBU 15a2 Creating BCCSP-based MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.209 UTC [msp] New -> DEBU 15a3 Creating Cache-MSP instance"
orderer0.example.com | "2019-05-02 09:28:04.212 UTC [msp] Setup -> DEBU 15a4 Setting up MSP instance OrdererMSP"
orderer0.example.com | "2019-05-02 09:28:04.216 UTC [msp.identity] newIdentity -> DEBU 15a5 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.219 UTC [msp.identity] newIdentity -> DEBU 15a6 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:04.221 UTC [msp] Validate -> DEBU 15a7 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:28:04.225 UTC [msp] Setup -> DEBU 15a8 Setting up the MSP manager (4 msps)"
orderer0.example.com | "2019-05-02 09:28:04.226 UTC [msp] Setup -> DEBU 15a9 MSP manager setup complete, setup 4 msps"
orderer0.example.com | "2019-05-02 09:28:04.227 UTC [policies] NewManagerImpl -> DEBU 15aa Proposed new policy Writers for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.228 UTC [policies] NewManagerImpl -> DEBU 15ab Proposed new policy Admins for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ac Proposed new policy Endorsement for Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ad Proposed new policy Readers for Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1330 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1331 0xc0030ff940 gate 1556789252808960100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1332 0xc0030ff940 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1333 0xc0030ff940 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1334 0xc0030ff940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1335 0xc0030ff940 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 1336 0xc0030ff940 gate 1556789252808960100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1337 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1338 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1339 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 133a 0xc00325a180 gate 1556789252809434900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133b 0xc00325a180 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133c 0xc00325a180 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133d 0xc00325a180 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1340 0xc00325a180 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [cauthdsl] func1 -> DEBU 1341 0xc00325a180 gate 1556789252809434900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1344 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1346 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1347 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [msp] DeserializeIdentity -> DEBU 1348 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1349 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [gossip.comm] Send -> DEBU 134c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 134f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1350 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1351 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1352 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1353 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1354 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1355 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1356 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1358 0xc00325baa0 gate 1556789252825268200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1359 0xc00325baa0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135a 0xc00325baa0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135b 0xc00325baa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135c 0xc00325baa0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 135d 0xc00325baa0 gate 1556789252825268200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1361 0xc0035ee2e0 gate 1556789252825782000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1362 0xc0035ee2e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1363 0xc0035ee2e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1364 0xc0035ee2e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1365 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1366 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [cauthdsl] func2 -> DEBU 1367 0xc0035ee2e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [cauthdsl] func1 -> DEBU 1368 0xc0035ee2e0 gate 1556789252825782000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 1369 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp] DeserializeIdentity -> DEBU 136d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [gossip.gossip] handleMessage -> DEBU 136e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.comm] func1 -> DEBU 136f Got message: GossipMessage: tag:EMPTY hello:<nonce:460910170641162726 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.gossip] handleMessage -> DEBU 1370 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:460910170641162726 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.pull] HandleMessage -> DEBU 1371 GossipMessage: tag:EMPTY hello:<nonce:460910170641162726 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [msp] DeserializeIdentity -> DEBU 1372 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1373 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1374 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1375 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1376 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1377 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [gossip.pull] SendDigest -> DEBU 1378 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [gossip.gossip] handleMessage -> DEBU 1379 Exiting"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ae Proposed new policy Readers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15af Proposed new policy Writers for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b0 Proposed new policy Admins for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b1 Proposed new policy Endorsement for Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b2 Proposed new policy Readers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Writers for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.231 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Admins for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.236 UTC [policies] NewManagerImpl -> DEBU 15b5 Proposed new policy Endorsement for Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b6 Proposed new policy Readers for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy Writers for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy Admins for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Endorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy LifecycleEndorsement for Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bb Proposed new policy Readers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bc Proposed new policy Writers for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Admins for Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Readers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Writers for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Admins for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy BlockValidation for Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Admins for Channel"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Readers for Channel"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy Writers for Channel"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c5 Adding to config map: [Group] /Channel"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c6 Adding to config map: [Group] /Channel/Application"
orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c7 Adding to config map: [Group] /Channel/Application/Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Group] /Channel/Application/Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Group] /Channel/Application/Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Value] /Channel/Application/ACLs"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Value] /Channel/Application/Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Policy] /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Policy] /Channel/Application/Writers"
orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Policy] /Channel/Application/Admins"
orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Endorsement"
orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Group] /Channel/Orderer"
orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Value] /Channel/Orderer/BatchSize"
orderer0.example.com | "2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
orderer0.example.com | "2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
orderer0.example.com | "2019-05-02 09:28:04.249 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Value] /Channel/Orderer/Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.251 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Policy] /Channel/Orderer/Admins"
orderer0.example.com | "2019-05-02 09:28:04.254 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
orderer0.example.com | "2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/Writers"
orderer0.example.com | "2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Value] /Channel/BlockDataHashingStructure"
orderer0.example.com | "2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/OrdererAddresses"
orderer0.example.com | "2019-05-02 09:28:04.257 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Capabilities"
orderer0.example.com | "2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/HashingAlgorithm"
orderer0.example.com | "2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/Consortium"
orderer0.example.com | "2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Policy] /Channel/Admins"
orderer0.example.com | "2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:04.261 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Writers"
orderer0.example.com | "2019-05-02 09:28:04.266 UTC [common.channelconfig] LogSanityChecks -> DEBU 15f9 As expected, current configuration has policy '/Channel/Readers'"
orderer0.example.com | "2019-05-02 09:28:04.267 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fa As expected, current configuration has policy '/Channel/Writers'"
orderer0.example.com | "2019-05-02 09:28:04.269 UTC [policies] Manager -> DEBU 15fb Manager Channel looking up path [Application]"
orderer0.example.com | "2019-05-02 09:28:04.270 UTC [policies] Manager -> DEBU 15fc Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:04.271 UTC [policies] Manager -> DEBU 15fd Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:04.272 UTC [policies] Manager -> DEBU 15fe Manager Channel/Application looking up path []"
orderer0.example.com | "2019-05-02 09:28:04.274 UTC [policies] Manager -> DEBU 15ff Manager Channel/Application has managers Org3MSP"
orderer0.example.com | "2019-05-02 09:28:04.275 UTC [policies] Manager -> DEBU 1600 Manager Channel/Application has managers Org1MSP"
orderer0.example.com | "2019-05-02 09:28:04.276 UTC [policies] Manager -> DEBU 1601 Manager Channel/Application has managers Org2MSP"
orderer0.example.com | "2019-05-02 09:28:04.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1602 As expected, current configuration has policy '/Channel/Application/Readers'"
orderer0.example.com | "2019-05-02 09:28:04.277 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Application/Writers'"
orderer0.example.com | "2019-05-02 09:28:04.278 UTC [common.channelconfig] LogSanityChecks -> DEBU 1604 As expected, current configuration has policy '/Channel/Application/Admins'"
orderer0.example.com | "2019-05-02 09:28:04.279 UTC [policies] Manager -> DEBU 1605 Manager Channel looking up path [Orderer]"
orderer0.example.com | "2019-05-02 09:28:04.284 UTC [policies] Manager -> DEBU 1606 Manager Channel has managers Application"
orderer0.example.com | "2019-05-02 09:28:04.285 UTC [policies] Manager -> DEBU 1607 Manager Channel has managers Orderer"
orderer0.example.com | "2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1608 Manager Channel/Orderer looking up path []"
orderer0.example.com | "2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1609 Manager Channel/Orderer has managers OrdererOrg"
orderer0.example.com | "2019-05-02 09:28:04.287 UTC [common.channelconfig] LogSanityChecks -> DEBU 160a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
orderer0.example.com | "2019-05-02 09:28:04.287 UTC [common.capabilities] Supported -> DEBU 160b Orderer capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:28:04.288 UTC [common.capabilities] Supported -> DEBU 160c Channel capability V2_0 is supported and is enabled"
orderer0.example.com | "2019-05-02 09:28:04.288 UTC [orderer.common.server] func1 -> DEBU 160d Executing callback to update root CAs"
orderer0.example.com | "2019-05-02 09:28:04.289 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160e updating root CAs for channel [businesschannel]"
orderer0.example.com | "2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160f adding app root CAs for MSP [Org1MSP]"
orderer0.example.com | "2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1610 adding orderer root CAs for MSP [OrdererMSP]"
orderer0.example.com | "2019-05-02 09:28:04.291 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1611 adding app root CAs for MSP [Org2MSP]"
orderer0.example.com | "2019-05-02 09:28:04.292 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1612 adding app root CAs for MSP [Org3MSP]"
orderer0.example.com | "2019-05-02 09:28:04.297 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1613 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9"
orderer0.example.com | "2019-05-02 09:28:04.298 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1614 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9"
orderer0.example.com | "2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1615 Sign: plaintext: 0A020809120B0A090A03010203100418...38782EB8550459A628E82A4B1424BD7B "
orderer0.example.com | "2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1616 Sign: digest: 3F9FAB749D98D9BE91CF9BC47487CB032A854E85FED401A4872615AD0D3AA734 "
orderer0.example.com | "2019-05-02 09:28:04.304 UTC [fsblkstorage] indexBlock -> DEBU 1617 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets=
orderer0.example.com | txId= locPointer=offset=71, bytesLength=33870
orderer0.example.com | ]"
orderer0.example.com | "2019-05-02 09:28:04.309 UTC [fsblkstorage] updateCheckpoint -> DEBU 1618 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133542], isChainEmpty=[false], lastBlockNumber=[9]"
orderer0.example.com | "2019-05-02 09:28:04.310 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1619 [channel: businesschannel] Wrote block [9]"
orderer0.example.com | "2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161a Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs"
orderer0.example.com | "2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 3 on channel businesschannel took 89.7µs"
orderer0.example.com | "2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.3µs "
orderer0.example.com | "2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs "
orderer0.example.com | "2019-05-02 09:28:04.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1620 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1621 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs"
orderer0.example.com | "2019-05-02 09:28:04.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1622 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs "
orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1623 Sending msg of 28 bytes to 2 on channel businesschannel took 38.4µs"
orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs"
orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1625 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.4µs "
orderer0.example.com | "2019-05-02 09:28:04.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1626 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs "
orderer0.example.com | "2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1627 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1628 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1629 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162a Sending msg of 28 bytes to 3 on channel testchainid took 32µs"
orderer0.example.com | "2019-05-02 09:28:05.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.6µs "
orderer0.example.com | "2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162c Sending msg of 28 bytes to 2 on channel businesschannel took 38µs"
orderer0.example.com | "2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs"
orderer0.example.com | "2019-05-02 09:28:05.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs "
orderer0.example.com | "2019-05-02 09:28:05.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5747ms "
orderer0.example.com | "2019-05-02 09:28:05.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1630 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1631 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1632 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1633 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs"
orderer0.example.com | "2019-05-02 09:28:05.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1634 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs "
orderer0.example.com | "2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1635 Sending msg of 28 bytes to 2 on channel businesschannel took 38.2µs"
orderer0.example.com | "2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs"
orderer0.example.com | "2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1637 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.5µs "
orderer0.example.com | "2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1638 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.4µs "
orderer0.example.com | "2019-05-02 09:28:05.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1639 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:05.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.120 UTC [orderer.common.server] Deliver -> DEBU 163b Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163c Starting new deliver loop for 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163d Attempting to read seek info message from 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1641 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.123 UTC [msp] DeserializeIdentity -> DEBU 1643 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:06.123 UTC [msp.identity] newIdentity -> DEBU 1644 Creating identity instance for cert -----BEGIN CERTIFICATE-----
orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
orderer0.example.com | -----END CERTIFICATE-----"
orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func1 -> DEBU 1645 0xc0008a2dc0 gate 1556789286124513300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1646 0xc0008a2dc0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1647 0xc0008a2dc0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1648 0xc0008a2dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1649 0xc0008a2dc0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func1 -> DEBU 164a 0xc0008a2dc0 gate 1556789286124513300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.126 UTC [cauthdsl] func1 -> DEBU 164e 0xc000846110 gate 1556789286126635100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.126 UTC [cauthdsl] func2 -> DEBU 164f 0xc000846110 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1650 0xc000846110 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1651 0xc000846110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1652 0xc000846110 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func1 -> DEBU 1653 0xc000846110 gate 1556789286126635100 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1654 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.129 UTC [policies] Evaluate -> DEBU 1656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.129 UTC [cauthdsl] func1 -> DEBU 1657 0xc000846a50 gate 1556789286129302600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.129 UTC [cauthdsl] func2 -> DEBU 1658 0xc000846a50 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 1659 0xc000846a50 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165a 0xc000846a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165b 0xc000846a50 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func1 -> DEBU 165c 0xc000846a50 gate 1556789286129302600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] func1 -> DEBU 165f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1660 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1661 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1664 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func1 -> DEBU 1665 0xc0008478c0 gate 1556789286133163000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1666 0xc0008478c0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1667 0xc0008478c0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.134 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1668 Checking if identity satisfies MEMBER role for OrdererMSP"
orderer0.example.com | "2019-05-02 09:28:06.134 UTC [msp] Validate -> DEBU 1669 MSP OrdererMSP validating identity"
orderer0.example.com | "2019-05-02 09:28:06.135 UTC [cauthdsl] func2 -> DEBU 166a 0xc0008478c0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166b Verify: digest = 00000000 15 99 02 6f 82 d1 25 07 bc ac 92 f5 dd 9c 1e 5d |...o..%........]|
orderer0.example.com | 00000010 e1 ac 31 b0 0c a6 47 06 85 5c 7e 65 9a 19 24 16 |..1...G..\~e..$.|"
orderer0.example.com | "2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166c Verify: sig = 00000000 30 45 02 21 00 b1 5e 2a 28 81 d9 3b 83 a4 32 6d |0E.!..^*(..;..2m|
orderer0.example.com | 00000010 a1 a5 56 7d e0 b5 94 65 0f f1 c8 fa e9 2a 6b 7f |..V}...e.....*k.|
orderer0.example.com | 00000020 fa 71 fd ea d2 02 20 6d d6 0d c7 11 9d 63 94 d9 |.q.... m.....c..|
orderer0.example.com | 00000030 80 20 e7 d0 0d d9 b1 90 5a 11 15 a0 42 c9 0b bf |. ......Z...B...|
orderer0.example.com | 00000040 c7 3b be b2 a0 7a cf |.;...z.|"
orderer0.example.com | "2019-05-02 09:28:06.136 UTC [cauthdsl] func2 -> DEBU 166d 0xc0008478c0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:06.136 UTC [cauthdsl] func1 -> DEBU 166e 0xc0008478c0 gate 1556789286133163000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 166f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 1670 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1671 Signature set satisfies policy /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.comm] func1 -> DEBU 137a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 137d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 137e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [msp] DeserializeIdentity -> DEBU 137f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1380 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1381 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1382 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1384 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1385 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 1386 0xc0038f3440 gate 1556789252857384200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1387 0xc0038f3440 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1388 0xc0038f3440 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1389 0xc0038f3440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 138a 0xc0038f3440 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 138b 0xc0038f3440 gate 1556789252857384200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 138e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 138f 0xc0038f3c80 gate 1556789252858088600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1390 0xc0038f3c80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1391 0xc0038f3c80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1392 0xc0038f3c80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1393 Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.|
peer0.org1.example.com | 00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1394 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7|
peer0.org1.example.com | 00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3|
peer0.org1.example.com | 00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....|
peer0.org1.example.com | 00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..|
peer0.org1.example.com | 00000040 ad b7 3b 70 81 a7 |..;p..|"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1395 0xc0038f3c80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 1396 0xc0038f3c80 gate 1556789252858088600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 139b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 13a0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a3 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] Send -> DEBU 13a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13aa Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.004 UTC [msp] DeserializeIdentity -> DEBU 13ab Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.005 UTC [msp] DeserializeIdentity -> DEBU 13ac Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.007 UTC [gossip.pull] Hello -> DEBU 13ad Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:33.008 UTC [msp] DeserializeIdentity -> DEBU 13ae Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.009 UTC [msp] DeserializeIdentity -> DEBU 13af Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.009 UTC [gossip.comm] Send -> DEBU 13b0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12447959082874087959 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12447959082874087959 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.pull] HandleMessage -> DEBU 13b4 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [gossip.comm] func1 -> DEBU 13b6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [gossip.gossip] handleMessage -> DEBU 13b7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [msp] DeserializeIdentity -> DEBU 13b8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [gossip.gossip] handleMessage -> DEBU 13bb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.033 UTC [gossip.gossip] handleMessage -> DEBU 13bc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.034 UTC [msp] DeserializeIdentity -> DEBU 13bd Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1672 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1673 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1674 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.138 UTC [common.deliver] deliverBlocks -> DEBU 1675 [channel: businesschannel] Received seekInfo (0xc001190640) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] Next -> DEBU 1676 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] newBlockfileStream -> DEBU 1677 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1678 Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1679 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:06.140 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 167a blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167b [channel: businesschannel] Delivering block [9] for (0xc001190640) for 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167c [channel: businesschannel] Done delivering to 172.18.0.8:57408 for (0xc001190640)"
orderer0.example.com | "2019-05-02 09:28:06.141 UTC [common.deliver] Handle -> DEBU 167d Waiting for new SeekInfo from 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.142 UTC [common.deliver] Handle -> DEBU 167e Attempting to read seek info message from 172.18.0.8:57408"
orderer0.example.com | "2019-05-02 09:28:06.146 UTC [grpc] infof -> DEBU 167f transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:06.146 UTC [common.deliver] Handle -> WARN 1680 Error reading from 172.18.0.8:57408: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:06.147 UTC [orderer.common.server] func1 -> DEBU 1681 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:06.147 UTC [comm.grpc.server] 1 -> INFO 1682 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57408 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3689ms
orderer0.example.com | "2019-05-02 09:28:06.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1683 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1684 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs"
orderer0.example.com | "2019-05-02 09:28:06.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1685 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs "
orderer0.example.com | "2019-05-02 09:28:06.290 UTC [orderer.common.server] Deliver -> DEBU 1686 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:06.290 UTC [common.deliver] Handle -> DEBU 1687 Starting new deliver loop for 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.291 UTC [common.deliver] Handle -> DEBU 1688 Attempting to read seek info message from 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 1689 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 168a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.292 UTC [cauthdsl] func1 -> DEBU 168e 0xc000280bf0 gate 1556789286292646400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.292 UTC [cauthdsl] func2 -> DEBU 168f 0xc000280bf0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1690 0xc000280bf0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1691 0xc000280bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1692 0xc000280bf0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func1 -> DEBU 1693 0xc000280bf0 gate 1556789286292646400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1694 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.294 UTC [policies] Evaluate -> DEBU 1696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func1 -> DEBU 1697 0xc0002815f0 gate 1556789286294374000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1698 0xc0002815f0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1699 0xc0002815f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169a 0xc0002815f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169b 0xc0002815f0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func1 -> DEBU 169c 0xc0002815f0 gate 1556789286294374000 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.296 UTC [policies] Evaluate -> DEBU 169f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func1 -> DEBU 16a0 0xc000281e30 gate 1556789286296265600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a1 0xc000281e30 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a2 0xc000281e30 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a3 0xc000281e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.297 UTC [cauthdsl] func2 -> DEBU 16a4 0xc000281e30 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.297 UTC [cauthdsl] func1 -> DEBU 16a5 0xc000281e30 gate 1556789286296265600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] func1 -> DEBU 16a8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16a9 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.299 UTC [cauthdsl] func1 -> DEBU 16ae 0xc0002f6e60 gate 1556789286299774000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.299 UTC [cauthdsl] func2 -> DEBU 16af 0xc0002f6e60 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b0 0xc0002f6e60 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b1 0xc0002f6e60 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 e6 67 d1 c0 27 41 5d bd d7 c7 29 eb 81 a4 00 01 |.g..'A]...).....|
orderer0.example.com | 00000010 bb 77 6d 93 ac 1c aa d0 06 fe df 6f ae 0a 63 e8 |.wm........o..c.|"
orderer0.example.com | "2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 62 99 d0 52 fe be 42 f1 8a 07 7f 1e |0D. b..R..B.....|
orderer0.example.com | 00000010 2a 1e 87 aa 6a 3f 66 97 21 55 78 90 c4 6e 37 21 |*...j?f.!Ux..n7!|
orderer0.example.com | 00000020 98 66 4b 69 02 20 45 11 e1 36 06 a2 33 88 a5 2c |.fKi. E..6..3..,|
orderer0.example.com | 00000030 ff 95 17 22 b8 c3 e4 ae bd 1a e9 34 52 93 bc b7 |...".......4R...|
orderer0.example.com | 00000040 8e a5 b9 3b e1 01 |...;..|"
orderer0.example.com | "2019-05-02 09:28:06.301 UTC [cauthdsl] func2 -> DEBU 16b4 0xc0002f6e60 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:06.301 UTC [cauthdsl] func1 -> DEBU 16b5 0xc0002f6e60 gate 1556789286299774000 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b8 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16ba Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.302 UTC [common.deliver] deliverBlocks -> DEBU 16bc [channel: businesschannel] Received seekInfo (0xc001190ec0) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] Next -> DEBU 16bd Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] newBlockfileStream -> DEBU 16be newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16bf Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c0 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c1 blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c2 [channel: businesschannel] Delivering block [9] for (0xc001190ec0) for 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c3 [channel: businesschannel] Done delivering to 172.18.0.8:57410 for (0xc001190ec0)"
orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c4 Waiting for new SeekInfo from 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c5 Attempting to read seek info message from 172.18.0.8:57410"
orderer0.example.com | "2019-05-02 09:28:06.307 UTC [common.deliver] Handle -> WARN 16c6 Error reading from 172.18.0.8:57410: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:06.308 UTC [orderer.common.server] func1 -> DEBU 16c8 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:06.309 UTC [comm.grpc.server] 1 -> INFO 16c9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57410 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3832ms
orderer0.example.com | "2019-05-02 09:28:06.308 UTC [grpc] infof -> DEBU 16c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:06.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ca Sending msg of 28 bytes to 2 on channel businesschannel took 34.4µs"
orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs"
orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs "
orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs "
orderer0.example.com | "2019-05-02 09:28:06.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ce Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16cf Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d1 Sending msg of 28 bytes to 3 on channel testchainid took 132µs"
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13bf Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13c0 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func1 -> DEBU 13c4 0xc002c58190 gate 1556789253036212000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c5 0xc002c58190 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c6 0xc002c58190 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c7 0xc002c58190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func2 -> DEBU 13c8 0xc002c58190 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13c9 0xc002c58190 gate 1556789253036212000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13cd 0xc002c589d0 gate 1556789253037762500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13ce 0xc002c589d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13cf 0xc002c589d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13d0 0xc002c589d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d1 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d2 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:33.039 UTC [gossip.comm] func1 -> DEBU 13d3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.040 UTC [cauthdsl] func2 -> DEBU 13d4 0xc002c589d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.040 UTC [cauthdsl] func1 -> DEBU 13d5 0xc002c589d0 gate 1556789253037762500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d8 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.042 UTC [policies] Evaluate -> DEBU 13d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [msp] DeserializeIdentity -> DEBU 13da Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13db Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13dc Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [policies] Evaluate -> DEBU 13dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func1 -> DEBU 13e0 0xc002c59ab0 gate 1556789253047205100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e1 0xc002c59ab0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e2 0xc002c59ab0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e3 0xc002c59ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.048 UTC [cauthdsl] func2 -> DEBU 13e4 0xc002c59ab0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.048 UTC [cauthdsl] func1 -> DEBU 13e5 0xc002c59ab0 gate 1556789253047205100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [cauthdsl] func1 -> DEBU 13e9 0xc002fd42f0 gate 1556789253049289000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [cauthdsl] func2 -> DEBU 13ea 0xc002fd42f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13eb 0xc002fd42f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13ec 0xc002fd42f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [msp.identity] Verify -> DEBU 13ed Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:33.051 UTC [msp.identity] Verify -> DEBU 13ee Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:33.051 UTC [cauthdsl] func2 -> DEBU 13ef 0xc002fd42f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.054 UTC [cauthdsl] func1 -> DEBU 13f0 0xc002fd42f0 gate 1556789253049289000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.058 UTC [gossip.gossip] handleMessage -> DEBU 13f5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.059 UTC [gossip.gossip] handleMessage -> DEBU 13f6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.059 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:06.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.3µs "
orderer0.example.com | "2019-05-02 09:28:06.868 UTC [orderer.common.server] Deliver -> DEBU 16d3 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d4 Starting new deliver loop for 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d5 Attempting to read seek info message from 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [cauthdsl] func1 -> DEBU 16db 0xc00029e130 gate 1556789286869917300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.869 UTC [cauthdsl] func2 -> DEBU 16dc 0xc00029e130 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16dd 0xc00029e130 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16de 0xc00029e130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16df 0xc00029e130 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.871 UTC [cauthdsl] func1 -> DEBU 16e0 0xc00029e130 gate 1556789286869917300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.872 UTC [policies] Evaluate -> DEBU 16e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.872 UTC [cauthdsl] func1 -> DEBU 16e4 0xc00029eef0 gate 1556789286872551500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e5 0xc00029eef0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00029eef0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00029eef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00029eef0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func1 -> DEBU 16e9 0xc00029eef0 gate 1556789286872551500 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.874 UTC [cauthdsl] func1 -> DEBU 16ed 0xc00029f740 gate 1556789286874908800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ee 0xc00029f740 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00029f740 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00029f740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00029f740 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func1 -> DEBU 16f2 0xc00029f740 gate 1556789286874908800 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:06.875 UTC [policies] Evaluate -> DEBU 16f3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] func1 -> DEBU 16f5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f6 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16fa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func1 -> DEBU 16fb 0xc0000e05b0 gate 1556789286878209600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fc 0xc0000e05b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fd 0xc0000e05b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:06.879 UTC [cauthdsl] func2 -> DEBU 16fe 0xc0000e05b0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 16ff Verify: digest = 00000000 df 81 da 94 ae 24 38 32 83 21 79 12 4e 49 6d 6b |.....$82.!y.NImk|
orderer0.example.com | 00000010 d7 16 48 49 91 d7 c1 db d3 b6 ae be 50 d0 93 7c |..HI........P..||"
orderer0.example.com | "2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 1700 Verify: sig = 00000000 30 44 02 20 04 77 7f 3f a2 b2 27 58 fb 08 f2 80 |0D. .w.?..'X....|
orderer0.example.com | 00000010 a2 cc 55 9f 22 5f 77 eb 20 f2 68 9c 75 e9 9b 70 |..U."_w. .h.u..p|
orderer0.example.com | 00000020 64 3b 5a ef 02 20 66 1e c5 16 f2 1d 09 bb 6e b6 |d;Z.. f.......n.|
orderer0.example.com | 00000030 a7 af ec 49 c5 45 5c f6 56 19 66 b2 b8 a5 40 b5 |...I.E\.V.f...@.|
orderer0.example.com | 00000040 8c 8f 1c 1b 75 14 |....u.|"
orderer0.example.com | "2019-05-02 09:28:06.880 UTC [cauthdsl] func2 -> DEBU 1701 0xc0000e05b0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:06.880 UTC [cauthdsl] func1 -> DEBU 1702 0xc0000e05b0 gate 1556789286878209600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1703 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1704 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13fa Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [gossip.comm] Send -> DEBU 13fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.061 UTC [policies] Evaluate -> DEBU 1404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [cauthdsl] func1 -> DEBU 1407 0xc002fd5c10 gate 1556789253071235100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1408 0xc002fd5c10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1409 0xc002fd5c10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 140a 0xc002fd5c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [cauthdsl] func2 -> DEBU 140b 0xc002fd5c10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [cauthdsl] func1 -> DEBU 140c 0xc002fd5c10 gate 1556789253071235100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func1 -> DEBU 1410 0xc00354e450 gate 1556789253076117400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1411 0xc00354e450 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1412 0xc00354e450 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1413 0xc00354e450 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1414 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1415 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [cauthdsl] func2 -> DEBU 1416 0xc00354e450 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [cauthdsl] func1 -> DEBU 1417 0xc00354e450 gate 1556789253076117400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1418 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1419 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [msp] DeserializeIdentity -> DEBU 141c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [gossip.gossip] handleMessage -> DEBU 141d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151014 "
peer0.org1.example.com | "2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141f Sign: digest: C7341FCE558934916948EBA451F397BBCD8EB1334C90B5C2BE0FDD59FC916F20 "
peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1420 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1421 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [gossip.comm] Send -> DEBU 1422 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1423 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1424 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1425 Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1705 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1707 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.882 UTC [policies] Evaluate -> DEBU 1708 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:06.882 UTC [common.deliver] deliverBlocks -> DEBU 1709 [channel: businesschannel] Received seekInfo (0xc001191500) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.882 UTC [fsblkstorage] Next -> DEBU 170a Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 170b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170c Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170d Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170e blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:06.884 UTC [common.deliver] deliverBlocks -> DEBU 170f [channel: businesschannel] Delivering block [9] for (0xc001191500) for 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.885 UTC [common.deliver] deliverBlocks -> DEBU 1710 [channel: businesschannel] Done delivering to 172.18.0.8:57412 for (0xc001191500)"
orderer0.example.com | "2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1711 Waiting for new SeekInfo from 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1712 Attempting to read seek info message from 172.18.0.8:57412"
orderer0.example.com | "2019-05-02 09:28:06.891 UTC [common.deliver] Handle -> WARN 1713 Error reading from 172.18.0.8:57412: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:06.891 UTC [grpc] infof -> DEBU 1714 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:06.892 UTC [orderer.common.server] func1 -> DEBU 1715 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:06.892 UTC [comm.grpc.server] 1 -> INFO 1716 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57412 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0172ms
orderer0.example.com | "2019-05-02 09:28:06.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1717 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs"
orderer0.example.com | "2019-05-02 09:28:06.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1718 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs"
orderer0.example.com | "2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1719 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163µs "
orderer0.example.com | "2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.2µs "
orderer0.example.com | "2019-05-02 09:28:06.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:06.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.064 UTC [orderer.common.server] Deliver -> DEBU 171d Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:07.064 UTC [common.deliver] Handle -> DEBU 171e Starting new deliver loop for 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.065 UTC [common.deliver] Handle -> DEBU 171f Attempting to read seek info message from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1720 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1721 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1722 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1723 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1724 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.067 UTC [cauthdsl] func1 -> DEBU 1725 0xc00084ce10 gate 1556789287067886600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1726 0xc00084ce10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1727 0xc00084ce10 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1728 0xc00084ce10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1729 0xc00084ce10 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.069 UTC [cauthdsl] func1 -> DEBU 172a 0xc00084ce10 gate 1556789287067886600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func1 -> DEBU 172e 0xc00084d660 gate 1556789287069961300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 172f 0xc00084d660 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1730 0xc00084d660 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1731 0xc00084d660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1732 0xc00084d660 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.071 UTC [cauthdsl] func1 -> DEBU 1733 0xc00084d660 gate 1556789287069961300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1734 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1735 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1736 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1426 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1427 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1428 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1429 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU 142f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1430 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1431 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c|
peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|"
peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1432 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......|
peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i|
peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.|
peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...|
peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|"
peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1433 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1434 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1435 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1436 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...|
peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |"
peer0.org1.example.com | "2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1437 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.|
peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..|
peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9|
peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....|
peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|"
peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 1438 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] isSentByMe -> DEBU 1439 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 143a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 143b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.099 UTC [msp] DeserializeIdentity -> DEBU 143c Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func1 -> DEBU 1737 0xc00084dea0 gate 1556789287072160100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1738 0xc00084dea0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1739 0xc00084dea0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 173a 0xc00084dea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.073 UTC [cauthdsl] func2 -> DEBU 173b 0xc00084dea0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.073 UTC [cauthdsl] func1 -> DEBU 173c 0xc00084dea0 gate 1556789287072160100 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.073 UTC [policies] Evaluate -> DEBU 173d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.074 UTC [policies] Evaluate -> DEBU 173e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.074 UTC [policies] func1 -> DEBU 173f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1740 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1741 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1744 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func1 -> DEBU 1745 0xc0008e4cf0 gate 1556789287077290500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1746 0xc0008e4cf0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1747 0xc0008e4cf0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.078 UTC [cauthdsl] func2 -> DEBU 1748 0xc0008e4cf0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 03 fc 72 46 26 c5 b9 b1 0a ad 9c ea 08 c0 4d cf |..rF&.........M.|
orderer0.example.com | 00000010 2b 2d 19 e8 2c 5a e5 d4 a9 c7 11 d2 22 88 26 71 |+-..,Z......".&q|"
orderer0.example.com | "2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 99 d2 71 1c 6f cd a6 fc 0f 1b 07 |0E.!...q.o......|
orderer0.example.com | 00000010 1a 32 df 27 10 64 ba 51 dd 7a 35 c0 02 a7 52 8e |.2.'.d.Q.z5...R.|
orderer0.example.com | 00000020 48 d3 63 b2 91 02 20 1a 15 b7 77 bc 9c 16 d7 49 |H.c... ...w....I|
orderer0.example.com | 00000030 0c 06 28 1b 6a 0c f2 41 e1 6f 9d c5 10 01 17 82 |..(.j..A.o......|
orderer0.example.com | 00000040 31 98 aa 46 d5 f4 3e |1..F..>|"
orderer0.example.com | "2019-05-02 09:28:07.079 UTC [cauthdsl] func2 -> DEBU 174b 0xc0008e4cf0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.079 UTC [cauthdsl] func1 -> DEBU 174c 0xc0008e4cf0 gate 1556789287077290500 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174f Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 1750 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1751 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1752 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.081 UTC [common.deliver] deliverBlocks -> DEBU 1753 [channel: businesschannel] Received seekInfo (0xc0008d0700) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.082 UTC [fsblkstorage] Next -> DEBU 1754 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1755 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1756 Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1757 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1758 blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 1759 [channel: businesschannel] Delivering block [9] for (0xc0008d0700) for 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 175a [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0700)"
orderer0.example.com | "2019-05-02 09:28:07.088 UTC [common.deliver] Handle -> DEBU 175b Waiting for new SeekInfo from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.089 UTC [common.deliver] Handle -> DEBU 175c Attempting to read seek info message from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1762 0xc00091eec0 gate 1556789287090182300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1763 0xc00091eec0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1764 0xc00091eec0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1765 0xc00091eec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1766 0xc00091eec0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1767 0xc00091eec0 gate 1556789287090182300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 143d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1443 0xc002463810 gate 1556789253101569700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1444 0xc002463810 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1445 0xc002463810 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1446 0xc002463810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1447 0xc002463810 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1448 0xc002463810 gate 1556789253101569700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 1449 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [cauthdsl] func1 -> DEBU 144c 0xc0024bc050 gate 1556789253102414900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [cauthdsl] func2 -> DEBU 144d 0xc0024bc050 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 144e 0xc0024bc050 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [gossip.pull] Hello -> DEBU 144f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [gossip.comm] Send -> DEBU 1450 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10440964464786897320 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1451 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1452 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15873546593035671781 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1453 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1454 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16040923857937586268 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1455 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16040923857937586268 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1456 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.108 UTC [gossip.comm] sendToEndpoint -> DEBU 1457 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10440964464786897320 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1458 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1459 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15873546593035671781 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 145a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.110 UTC [gossip.comm] func1 -> DEBU 145b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.110 UTC [gossip.gossip] handleMessage -> DEBU 145c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.112 UTC [gossip.comm] func1 -> DEBU 145d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 145e 0xc0024bc050 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 145f Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.|
peer0.org1.example.com | 00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|"
peer0.org1.example.com | "2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 1460 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7|
peer0.org1.example.com | 00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3|
peer0.org1.example.com | 00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....|
peer0.org1.example.com | 00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..|
peer0.org1.example.com | 00000040 ad b7 3b 70 81 a7 |..;p..|"
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func1 -> DEBU 176b 0xc00091f710 gate 1556789287091575100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176c 0xc00091f710 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176d 0xc00091f710 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176e 0xc00091f710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176f 0xc00091f710 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func1 -> DEBU 1770 0xc00091f710 gate 1556789287091575100 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.092 UTC [policies] Evaluate -> DEBU 1771 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func1 -> DEBU 1774 0xc00091ff90 gate 1556789287093427700 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1775 0xc00091ff90 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1776 0xc00091ff90 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1777 0xc00091ff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1778 0xc00091ff90 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func1 -> DEBU 1779 0xc00091ff90 gate 1556789287093427700 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] func1 -> DEBU 177c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177d Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.097 UTC [cauthdsl] func1 -> DEBU 1782 0xc000b86e00 gate 1556789287097171600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.097 UTC [cauthdsl] func2 -> DEBU 1783 0xc000b86e00 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1784 0xc000b86e00 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1785 0xc000b86e00 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1786 Verify: digest = 00000000 ae 90 af dd 56 b7 e7 04 36 2d 74 52 10 c4 d2 62 |....V...6-tR...b|
orderer0.example.com | 00000010 b5 b7 65 60 d9 3c d4 af a5 d6 58 6e 6d 0c 63 36 |..e`.<....Xnm.c6|"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1787 Verify: sig = 00000000 30 45 02 21 00 8e 33 d2 96 95 98 f0 ae b7 ad 8e |0E.!..3.........|
orderer0.example.com | 00000010 c2 3f ef 84 44 fb 98 1a 42 77 0e b8 be 48 a0 4d |.?..D...Bw...H.M|
orderer0.example.com | 00000020 87 0c 28 24 c1 02 20 6a e7 b2 d1 b6 1e b0 99 26 |..($.. j.......&|
orderer0.example.com | 00000030 80 22 50 4e 99 d2 63 1e 40 81 8f 07 7c 54 6b 3b |."PN..c.@...|Tk;|
orderer0.example.com | 00000040 6d 50 26 b6 3f 30 5f |mP&.?0_|"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [cauthdsl] func2 -> DEBU 1788 0xc000b86e00 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [cauthdsl] func1 -> DEBU 1789 0xc000b86e00 gate 1556789287097171600 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178c Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178e Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.099 UTC [common.deliver] deliverBlocks -> DEBU 1790 [channel: businesschannel] Received seekInfo (0xc0008d0b40) start:<specified:<number:9 > > stop:<specified:<number:9 > > from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] Next -> DEBU 1791 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] newBlockfileStream -> DEBU 1792 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1793 Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1794 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1795 blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1796 [channel: businesschannel] Delivering block [9] for (0xc0008d0b40) for 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1797 [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0b40)"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1798 Waiting for new SeekInfo from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1799 Attempting to read seek info message from 172.18.0.8:57414"
orderer0.example.com | "2019-05-02 09:28:07.110 UTC [common.deliver] Handle -> WARN 179a Error reading from 172.18.0.8:57414: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:07.110 UTC [orderer.common.server] func1 -> DEBU 179b Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:07.110 UTC [comm.grpc.server] 1 -> INFO 179c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57414 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.7859ms
orderer0.example.com | "2019-05-02 09:28:07.110 UTC [grpc] infof -> DEBU 179d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:07.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 179e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 179f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs"
orderer0.example.com | "2019-05-02 09:28:07.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.7µs "
orderer0.example.com | "2019-05-02 09:28:07.264 UTC [orderer.common.server] Deliver -> DEBU 17a1 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a2 Starting new deliver loop for 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a3 Attempting to read seek info message from 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func1 -> DEBU 17a9 0xc000888e10 gate 1556789287267023600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17aa 0xc000888e10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ab 0xc000888e10 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ac 0xc000888e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ad 0xc000888e10 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.268 UTC [cauthdsl] func1 -> DEBU 17ae 0xc000888e10 gate 1556789287267023600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17af Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.269 UTC [policies] Evaluate -> DEBU 17b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func1 -> DEBU 17b2 0xc000889660 gate 1556789287269600400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b3 0xc000889660 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b4 0xc000889660 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b5 0xc000889660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b6 0xc000889660 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func1 -> DEBU 17b7 0xc000889660 gate 1556789287269600400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.270 UTC [policies] Evaluate -> DEBU 17b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000889ed0 gate 1556789287271698300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000889ed0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000889ed0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17be 0xc000889ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000889ed0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000889ed0 gate 1556789287271698300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] func1 -> DEBU 17c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c4 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [cauthdsl] func2 -> DEBU 1461 0xc0024bc050 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [cauthdsl] func1 -> DEBU 1462 0xc0024bc050 gate 1556789253102414900 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00105ebc0 gate 1556789287274469800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1463 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00105ebc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1464 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00105ebc0 processing identity 0 with bytes of efef60"
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1465 Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00105ebc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1466 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.274 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 f1 7b 7b 6e 6a df d1 51 73 11 0a c3 11 00 52 37 |.{{nj..Qs.....R7|
peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1467 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes"
orderer0.example.com | 00000010 07 cf 5a fb 05 39 8e 2e 4b 35 7b af 65 cf fa ba |..Z..9..K5{.e...|"
peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1468 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1469 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 146d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [msp] DeserializeIdentity -> DEBU 146e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 146f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1470 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1471 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1472 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1473 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [policies] Evaluate -> DEBU 1474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func1 -> DEBU 1475 0xc0024bdcb0 gate 1556789253119545200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1476 0xc0024bdcb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1477 0xc0024bdcb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1478 0xc0024bdcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1479 0xc0024bdcb0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func1 -> DEBU 147a 0xc0024bdcb0 gate 1556789253119545200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func1 -> DEBU 147e 0xc00262e4f0 gate 1556789253122232300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 147f 0xc00262e4f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1480 0xc00262e4f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1481 0xc00262e4f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [msp.identity] Verify -> DEBU 1482 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...|
peer0.org1.example.com | 00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|"
orderer0.example.com | "2019-05-02 09:28:07.275 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 45 02 21 00 b5 f8 b5 9d 83 5e 31 ca cb 20 7d |0E.!......^1.. }|
orderer0.example.com | 00000010 f7 6a 8e ea 9d ab 46 15 4b aa a3 5a b5 68 dd 34 |.j....F.K..Z.h.4|
orderer0.example.com | 00000020 49 2b 51 f9 79 02 20 07 29 af 1b 43 f4 a6 a2 54 |I+Q.y. .)..C...T|
orderer0.example.com | 00000030 d2 41 ca fe 6a e1 0f ad b0 e6 19 ff 46 40 31 d2 |.A..j.......F@1.|
orderer0.example.com | 00000040 5b 3c e3 24 82 c2 5c |[<.$..\|"
orderer0.example.com | "2019-05-02 09:28:07.275 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00105ebc0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.276 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00105ebc0 gate 1556789287274469800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d5 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.277 UTC [common.deliver] deliverBlocks -> DEBU 17d7 [channel: businesschannel] Received seekInfo (0xc001191e80) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] Next -> DEBU 17d8 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] newBlockfileStream -> DEBU 17d9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17da Remaining bytes=[133542], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17db Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17dc blockbytes [23935] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.279 UTC [common.deliver] deliverBlocks -> DEBU 17dd [channel: businesschannel] Delivering block [0] for (0xc001191e80) for 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.280 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Done delivering to 172.18.0.8:57416 for (0xc001191e80)"
orderer0.example.com | "2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17df Waiting for new SeekInfo from 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17e0 Attempting to read seek info message from 172.18.0.8:57416"
orderer0.example.com | "2019-05-02 09:28:07.289 UTC [common.deliver] Handle -> WARN 17e1 Error reading from 172.18.0.8:57416: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:07.289 UTC [orderer.common.server] func1 -> DEBU 17e2 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:07.289 UTC [comm.grpc.server] 1 -> INFO 17e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57416 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1514ms
orderer0.example.com | "2019-05-02 09:28:07.290 UTC [grpc] infof -> DEBU 17e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs"
orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e6 Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs"
orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.9µs "
orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.8µs "
orderer0.example.com | "2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.471 UTC [orderer.common.server] Deliver -> DEBU 17eb Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:07.471 UTC [common.deliver] Handle -> DEBU 17ec Starting new deliver loop for 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.472 UTC [common.deliver] Handle -> DEBU 17ed Attempting to read seek info message from 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.473 UTC [cauthdsl] func1 -> DEBU 17f3 0xc001079af0 gate 1556789287473693100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.473 UTC [cauthdsl] func2 -> DEBU 17f4 0xc001079af0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f5 0xc001079af0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f6 0xc001079af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f7 0xc001079af0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func1 -> DEBU 17f8 0xc001079af0 gate 1556789287473693100 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.474 UTC [policies] Evaluate -> DEBU 17f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.123 UTC [msp.identity] Verify -> DEBU 1483 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..|
orderer0.example.com | "2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | 00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......|
orderer0.example.com | "2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | 00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp..<t.o)|
peer0.org1.example.com | 00000030 b3 5e e2 17 05 c4 0e 20 55 4b fe 7b 15 f0 cf 72 |.^..... UK.{...r|
peer0.org1.example.com | 00000040 7b 52 d7 72 78 9d 67 |{R.rx.g|"
peer0.org1.example.com | "2019-05-02 09:27:33.123 UTC [cauthdsl] func2 -> DEBU 1484 0xc00262e4f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [cauthdsl] func1 -> DEBU 1485 0xc00262e4f0 gate 1556789253122232300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1486 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1487 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1488 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1489 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 148c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...|
peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |"
peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.|
peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..|
peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9|
peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....|
peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|"
peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 148f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] isSentByMe -> DEBU 1490 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 1491 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1492 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [msp.identity] Verify -> DEBU 1493 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c|
peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|"
peer0.org1.example.com | "2019-05-02 09:27:33.127 UTC [msp.identity] Verify -> DEBU 1494 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......|
peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i|
peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.|
peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...|
peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|"
peer0.org1.example.com | "2019-05-02 09:27:33.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 1495 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1496 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1497 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1498 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 1499 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 149a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149f Exiting"
orderer0.example.com | "2019-05-02 09:28:07.475 UTC [cauthdsl] func1 -> DEBU 17fc 0xc001094330 gate 1556789287475738900 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fd 0xc001094330 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fe 0xc001094330 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17ff 0xc001094330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.477 UTC [cauthdsl] func2 -> DEBU 1800 0xc001094330 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.477 UTC [cauthdsl] func1 -> DEBU 1801 0xc001094330 gate 1556789287475738900 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1802 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1803 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.478 UTC [policies] Evaluate -> DEBU 1804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func1 -> DEBU 1805 0xc001094b70 gate 1556789287478306900 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1806 0xc001094b70 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1807 0xc001094b70 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1808 0xc001094b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.479 UTC [cauthdsl] func2 -> DEBU 1809 0xc001094b70 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.479 UTC [cauthdsl] func1 -> DEBU 180a 0xc001094b70 gate 1556789287478306900 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] func1 -> DEBU 180d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180e Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1810 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1811 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1812 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func1 -> DEBU 1813 0xc001095860 gate 1556789287482124100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1814 0xc001095860 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1815 0xc001095860 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.483 UTC [cauthdsl] func2 -> DEBU 1816 0xc001095860 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1817 Verify: digest = 00000000 74 54 48 33 e7 8f c3 2c 08 ea 8e 5e 3f 4c ba 83 |tTH3...,...^?L..|
orderer0.example.com | 00000010 90 32 db 7f 94 33 ba 33 4b 37 9f 4f e7 ed e2 5e |.2...3.3K7.O...^|"
orderer0.example.com | "2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1818 Verify: sig = 00000000 30 45 02 21 00 f1 dc 4f 4d 28 31 c5 7d 2d 29 b7 |0E.!...OM(1.}-).|
orderer0.example.com | 00000010 b8 07 06 08 f7 12 8d 8d 07 1b a4 d1 0d 6a 98 6b |.............j.k|
orderer0.example.com | 00000020 c9 73 ad a4 96 02 20 5e 3c 7b 63 ca 1b 7e 18 89 |.s.... ^<{c..~..|
orderer0.example.com | 00000030 4d 8f 2d 75 ab d4 cb c2 c1 d1 90 a3 25 b6 cf a5 |M.-u........%...|
orderer0.example.com | 00000040 c7 8a 81 a9 10 8c c2 |.......|"
orderer0.example.com | "2019-05-02 09:28:07.484 UTC [cauthdsl] func2 -> DEBU 1819 0xc001095860 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.484 UTC [cauthdsl] func1 -> DEBU 181a 0xc001095860 gate 1556789287482124100 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181d Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181f Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.487 UTC [policies] Evaluate -> DEBU 1820 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.487 UTC [common.deliver] deliverBlocks -> DEBU 1821 [channel: businesschannel] Received seekInfo (0xc000b6d640) start:<specified:<number:1 > > stop:<specified:<number:1 > > from 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.488 UTC [fsblkstorage] Next -> DEBU 1822 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.488 UTC [fsblkstorage] newBlockfileStream -> DEBU 1823 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]"
orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1824 Remaining bytes=[109604], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1825 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}"
orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1826 blockbytes [23684] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1827 [channel: businesschannel] Delivering block [1] for (0xc000b6d640) for 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1828 [channel: businesschannel] Done delivering to 172.18.0.8:57418 for (0xc000b6d640)"
orderer0.example.com | "2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 1829 Waiting for new SeekInfo from 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 182a Attempting to read seek info message from 172.18.0.8:57418"
orderer0.example.com | "2019-05-02 09:28:07.500 UTC [grpc] infof -> DEBU 182b transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:07.500 UTC [common.deliver] Handle -> WARN 182c Error reading from 172.18.0.8:57418: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:07.501 UTC [orderer.common.server] func1 -> DEBU 182d Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:07.501 UTC [comm.grpc.server] 1 -> INFO 182e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57418 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1933ms
orderer0.example.com | "2019-05-02 09:28:07.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1830 Sending msg of 28 bytes to 3 on channel testchainid took 20µs"
orderer0.example.com | "2019-05-02 09:28:07.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1831 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs "
orderer0.example.com | "2019-05-02 09:28:07.698 UTC [orderer.common.server] Deliver -> DEBU 1832 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1833 Starting new deliver loop for 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1834 Attempting to read seek info message from 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [cauthdsl] func1 -> DEBU 183a 0xc0010d2250 gate 1556789287699654200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.699 UTC [cauthdsl] func2 -> DEBU 183b 0xc0010d2250 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.700 UTC [cauthdsl] func2 -> DEBU 183c 0xc0010d2250 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183d 0xc0010d2250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183e 0xc0010d2250 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func1 -> DEBU 183f 0xc0010d2250 gate 1556789287699654200 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.701 UTC [policies] Evaluate -> DEBU 1840 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1842 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.702 UTC [cauthdsl] func1 -> DEBU 1843 0xc0010d2aa0 gate 1556789287702893400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1844 0xc0010d2aa0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1845 0xc0010d2aa0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1846 0xc0010d2aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1847 0xc0010d2aa0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func1 -> DEBU 1848 0xc0010d2aa0 gate 1556789287702893400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 1849 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func1 -> DEBU 184c 0xc0010d32e0 gate 1556789287704310800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184d 0xc0010d32e0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184e 0xc0010d32e0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184f 0xc0010d32e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.705 UTC [cauthdsl] func2 -> DEBU 1850 0xc0010d32e0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.705 UTC [cauthdsl] func1 -> DEBU 1851 0xc0010d32e0 gate 1556789287704310800 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1852 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] func1 -> DEBU 1854 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1855 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1856 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1859 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.707 UTC [cauthdsl] func1 -> DEBU 185a 0xc0010e2130 gate 1556789287707663400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.707 UTC [cauthdsl] func2 -> DEBU 185b 0xc0010e2130 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185c 0xc0010e2130 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185d 0xc0010e2130 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185e Verify: digest = 00000000 53 c4 84 a5 42 ab 50 3e 8e 0c 15 0e 81 d6 0d 08 |S...B.P>........|
orderer0.example.com | 00000010 10 de c5 dd 24 87 7d 6e 4f ab 36 e0 fd ee 1a 62 |....$.}nO.6....b|"
orderer0.example.com | "2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185f Verify: sig = 00000000 30 45 02 21 00 90 13 e2 88 04 02 95 01 89 44 38 |0E.!..........D8|
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3784822489411649935 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a4 GossipMessage: tag:EMPTY hello:<nonce:3784822489411649935 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] SendDigest -> DEBU 14a5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.gossip] handleMessage -> DEBU 14a6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14a7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a8 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...|
peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a9 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.|
peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..|
peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9|
peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....|
peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14aa Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14ab Verify: sig = 00000000 30 45 02 21 00 97 91 fc 75 f8 16 ef f9 ce fd e7 |0E.!....u.......|
peer0.org1.example.com | 00000010 66 74 df 92 0a 63 f4 fe 9e c5 34 6d e0 30 75 b9 |ft...c....4m.0u.|
peer0.org1.example.com | 00000020 54 09 db df f8 02 20 09 a4 84 ef 71 1f f6 17 70 |T..... ....q...p|
peer0.org1.example.com | 00000030 6b fa 25 f0 93 3f 49 92 eb 44 be c6 74 07 f1 f5 |k.%..?I..D..t...|
peer0.org1.example.com | 00000040 2b 87 07 81 fd e4 a4 |+......|"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.discovery] isSentByMe -> DEBU 14ad Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ae Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14af Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.138 UTC [msp.identity] Verify -> DEBU 14b4 Verify: digest = 00000000 dc cc 08 6e f3 da cf d7 32 74 c5 29 44 aa 5c 54 |...n....2t.)D.\T|
peer0.org1.example.com | 00000010 95 e7 59 02 db 07 7b ca 16 30 22 01 7b 4d 33 1d |..Y...{..0".{M3.|"
peer0.org1.example.com | "2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b5 Verify: sig = 00000000 30 44 02 20 75 ab 06 ef 97 ff b1 05 b5 6b a4 8d |0D. u........k..|
peer0.org1.example.com | 00000010 50 8c 5d 93 a0 b3 03 32 fe dc 72 91 7e 6d 89 c5 |P.]....2..r.~m..|
peer0.org1.example.com | 00000020 44 32 ac 41 02 20 2f 4e 5a dd 1f 68 b8 52 cf 96 |D2.A. /NZ..h.R..|
peer0.org1.example.com | 00000030 77 02 68 7a 73 82 94 98 ba b9 08 82 fa 8a 65 60 |w.hzs.........e`|
peer0.org1.example.com | 00000040 5d 6a be ee fd 51 |]j...Q|"
peer0.org1.example.com | "2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:33.140 UTC [msp.identity] Verify -> DEBU 14b7 Verify: sig = 00000000 30 45 02 21 00 c7 0c 84 2c 0e d4 4b ce b1 ab ac |0E.!....,..K....|
peer0.org1.example.com | 00000010 26 60 88 98 a1 bd 0c 62 99 ec 3d 54 ef 0a 8a cb |&`.....b..=T....|
peer0.org1.example.com | 00000020 95 8e 09 b3 ce 02 20 55 de 36 b9 b7 44 ab fc 30 |...... U.6..D..0|
peer0.org1.example.com | 00000030 8a 8f b2 28 ed 43 e6 50 da ff f8 e8 db f3 a8 43 |...(.C.P.......C|
orderer0.example.com | 00000010 de ed 4e a5 2e e4 24 ac 0e 13 36 c8 6a bb f9 1b |..N...$...6.j...|
orderer0.example.com | 00000020 22 a4 93 3d 97 02 20 76 43 6c ca 27 c8 0a 53 b2 |"..=.. vCl.'..S.|
orderer0.example.com | 00000030 9b 73 98 04 7f 43 36 b6 98 ae 0a 56 67 34 50 5c |.s...C6....Vg4P\|
orderer0.example.com | 00000040 2e 65 f1 1a d9 f9 c7 |.e.....|"
orderer0.example.com | "2019-05-02 09:28:07.709 UTC [cauthdsl] func2 -> DEBU 1860 0xc0010e2130 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.709 UTC [cauthdsl] func1 -> DEBU 1861 0xc0010e2130 gate 1556789287707663400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1862 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1863 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1864 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1865 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1866 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1867 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.710 UTC [common.deliver] deliverBlocks -> DEBU 1868 [channel: businesschannel] Received seekInfo (0xc000b6dc80) start:<specified:<number:2 > > stop:<specified:<number:2 > > from 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.711 UTC [fsblkstorage] Next -> DEBU 1869 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] newBlockfileStream -> DEBU 186a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]"
orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186b Remaining bytes=[85917], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186c Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}"
orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186d blockbytes [23742] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186e [channel: businesschannel] Delivering block [2] for (0xc000b6dc80) for 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186f [channel: businesschannel] Done delivering to 172.18.0.8:57420 for (0xc000b6dc80)"
orderer0.example.com | "2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1870 Waiting for new SeekInfo from 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1871 Attempting to read seek info message from 172.18.0.8:57420"
orderer0.example.com | "2019-05-02 09:28:07.723 UTC [common.deliver] Handle -> WARN 1872 Error reading from 172.18.0.8:57420: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:07.724 UTC [orderer.common.server] func1 -> DEBU 1873 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:07.724 UTC [comm.grpc.server] 1 -> INFO 1874 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57420 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4878ms
orderer0.example.com | "2019-05-02 09:28:07.725 UTC [grpc] infof -> DEBU 1875 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:07.909 UTC [orderer.common.server] Deliver -> DEBU 1876 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1877 Starting new deliver loop for 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1878 Attempting to read seek info message from 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 1879 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func1 -> DEBU 187e 0xc0010f43a0 gate 1556789287911213300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 187f 0xc0010f43a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1880 0xc0010f43a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1881 0xc0010f43a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1882 0xc0010f43a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1883 0xc0010f43a0 gate 1556789287911213300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1887 0xc0010f4c20 gate 1556789287912946900 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1888 0xc0010f4c20 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1889 0xc0010f4c20 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188a 0xc0010f4c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188b 0xc0010f4c20 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func1 -> DEBU 188c 0xc0010f4c20 gate 1556789287912946900 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.914 UTC [cauthdsl] func1 -> DEBU 1890 0xc0010f5460 gate 1556789287914396400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.914 UTC [cauthdsl] func2 -> DEBU 1891 0xc0010f5460 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | 00000040 1c f4 57 57 c6 77 3c |..WW.w<|"
peer0.org1.example.com | "2019-05-02 09:27:33.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14ba updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 14be Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14bf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] sendMemResponse -> DEBU 14c0 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [gossip.comm] Send -> DEBU 14c3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.discovery] sendMemResponse -> DEBU 14c4 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [gossip.gossip] handleMessage -> DEBU 14c7 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:16737749478703005496 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [gossip.pull] HandleMessage -> DEBU 14c8 GossipMessage: tag:EMPTY hello:<nonce:16737749478703005496 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14ca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14cb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14ce Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [gossip.pull] SendDigest -> DEBU 14cf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:33.199 UTC [gossip.gossip] handleMessage -> DEBU 14d0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d1 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14d4 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [msp] DeserializeIdentity -> DEBU 14d5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.209 UTC [cauthdsl] func1 -> DEBU 14dc 0xc003390090 gate 1556789253209170200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14dd 0xc003390090 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14de 0xc003390090 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14df 0xc003390090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14e0 0xc003390090 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e1 0xc003390090 gate 1556789253209170200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e5 0xc0033908d0 gate 1556789253213341000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.214 UTC [cauthdsl] func2 -> DEBU 14e6 0xc0033908d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e7 0xc0033908d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e8 0xc0033908d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14e9 Verify: digest = 00000000 52 fe c7 74 0a 2c 61 71 73 b3 66 2e 1d af e8 7b |R..t.,aqs.f....{|
peer0.org1.example.com | 00000010 34 d7 22 72 ff 06 e7 53 ba 67 f9 88 8c a4 80 57 |4."r...S.g.....W|"
peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14ea Verify: sig = 00000000 30 45 02 21 00 8d f1 b9 69 ea 3a 20 8c 60 d8 c6 |0E.!....i.: .`..|
peer0.org1.example.com | 00000010 25 20 4f 72 ce 0a 56 97 9e 6a 4e 61 6a 98 a0 7c |% Or..V..jNaj..||
peer0.org1.example.com | 00000020 9e 12 bd 4d 44 02 20 04 9b a3 09 a1 44 3b 03 1d |...MD. .....D;..|
peer0.org1.example.com | 00000030 2c 39 d7 67 38 e3 26 d6 cc a8 4b 3e 88 a7 bd 7b |,9.g8.&...K>...{|
peer0.org1.example.com | 00000040 38 b3 bc 96 dc b8 0b |8......|"
peer0.org1.example.com | "2019-05-02 09:27:33.220 UTC [cauthdsl] func2 -> DEBU 14eb 0xc0033908d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.220 UTC [cauthdsl] func1 -> DEBU 14ec 0xc0033908d0 gate 1556789253213341000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ef Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.222 UTC [policies] Evaluate -> DEBU 14f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.222 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f3 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f4 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 "
peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] sendMemResponse -> DEBU 14f9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fa Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1892 0xc0010f5460 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1893 0xc0010f5460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1894 0xc0010f5460 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [cauthdsl] func1 -> DEBU 1895 0xc0010f5460 gate 1556789287914396400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1896 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1897 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] func1 -> DEBU 1898 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1899 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func1 -> DEBU 189e 0xc001116150 gate 1556789287917356800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 189f 0xc001116150 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a0 0xc001116150 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a1 0xc001116150 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a2 Verify: digest = 00000000 63 bd 8b 87 e9 ea d7 22 ed 74 7c ad 89 a0 b0 94 |c......".t|.....|
orderer0.example.com | 00000010 02 c1 77 50 a1 35 5b ee 67 6c 62 d8 8c 4a c4 a9 |..wP.5[.glb..J..|"
orderer0.example.com | "2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a3 Verify: sig = 00000000 30 45 02 21 00 8b ce df 03 a2 1a 2f 3f 8c c9 a6 |0E.!......./?...|
orderer0.example.com | 00000010 8f 5f 46 ba 1e 9a 98 b7 06 33 d6 32 ec 83 a8 d3 |._F......3.2....|
orderer0.example.com | 00000020 3d 42 b5 6e 30 02 20 02 99 21 9e 5e 01 f7 f5 d1 |=B.n0. ..!.^....|
orderer0.example.com | 00000030 62 1f 03 9d 7f 83 52 89 54 dd d6 e8 b3 af 76 58 |b.....R.T.....vX|
orderer0.example.com | 00000040 30 b4 6c f5 5f 89 df |0.l._..|"
orderer0.example.com | "2019-05-02 09:28:07.919 UTC [cauthdsl] func2 -> DEBU 18a4 0xc001116150 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:07.919 UTC [cauthdsl] func1 -> DEBU 18a5 0xc001116150 gate 1556789287917356800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a8 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18aa Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:07.921 UTC [common.deliver] deliverBlocks -> DEBU 18ac [channel: businesschannel] Received seekInfo (0xc0008d1680) start:<specified:<number:3 > > stop:<specified:<number:3 > > from 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.921 UTC [fsblkstorage] Next -> DEBU 18ad Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:07.921 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]"
orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18af Remaining bytes=[62172], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b0 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}"
orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b1 blockbytes [4709] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:07.922 UTC [common.deliver] deliverBlocks -> DEBU 18b2 [channel: businesschannel] Delivering block [3] for (0xc0008d1680) for 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.923 UTC [common.deliver] deliverBlocks -> DEBU 18b3 [channel: businesschannel] Done delivering to 172.18.0.8:57422 for (0xc0008d1680)"
orderer0.example.com | "2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b4 Waiting for new SeekInfo from 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b5 Attempting to read seek info message from 172.18.0.8:57422"
orderer0.example.com | "2019-05-02 09:28:07.932 UTC [common.deliver] Handle -> WARN 18b6 Error reading from 172.18.0.8:57422: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:07.933 UTC [orderer.common.server] func1 -> DEBU 18b7 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:07.933 UTC [comm.grpc.server] 1 -> INFO 18b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57422 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.6875ms
orderer0.example.com | "2019-05-02 09:28:07.933 UTC [grpc] infof -> DEBU 18b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ba Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs"
orderer0.example.com | "2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18bb Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs"
orderer0.example.com | "2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545.3µs "
orderer0.example.com | "2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs "
orderer0.example.com | "2019-05-02 09:28:07.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18be Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:07.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18bf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.104 UTC [orderer.common.server] Deliver -> DEBU 18c0 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c1 Starting new deliver loop for 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c2 Attempting to read seek info message from 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.106 UTC [cauthdsl] func1 -> DEBU 18c8 0xc0011291b0 gate 1556789288106110000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18c9 0xc0011291b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18ca 0xc0011291b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cb 0xc0011291b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cc 0xc0011291b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func1 -> DEBU 18cd 0xc0011291b0 gate 1556789288106110000 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.108 UTC [policies] Evaluate -> DEBU 18d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func1 -> DEBU 18d1 0xc001129a00 gate 1556789288108763400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d2 0xc001129a00 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d3 0xc001129a00 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d4 0xc001129a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d5 0xc001129a00 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func1 -> DEBU 18d6 0xc001129a00 gate 1556789288108763400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.110 UTC [policies] Evaluate -> DEBU 18d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func1 -> DEBU 18da 0xc000b24240 gate 1556789288110540100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18db 0xc000b24240 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18dc 0xc000b24240 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18dd 0xc000b24240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18de 0xc000b24240 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func1 -> DEBU 18df 0xc000b24240 gate 1556789288110540100 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] func1 -> DEBU 18e2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e3 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func1 -> DEBU 18e8 0xc000b24fa0 gate 1556789288112574500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18e9 0xc000b24fa0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18ea 0xc000b24fa0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18eb 0xc000b24fa0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [msp.identity] Verify -> DEBU 18ec Verify: digest = 00000000 c2 3a 59 e3 81 8e 03 36 c4 4b d6 0e 3c 63 f5 b5 |.:Y....6.K..<c..|
orderer0.example.com | 00000010 98 f3 26 e8 5d 83 2d fb 5d 62 50 30 92 25 cc 69 |..&.].-.]bP0.%.i|"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [msp.identity] Verify -> DEBU 18ed Verify: sig = 00000000 30 45 02 21 00 b7 41 33 2e 7f 02 54 33 71 dc f0 |0E.!..A3...T3q..|
orderer0.example.com | 00000010 7b 0b 3d ed e5 81 e7 9e 18 9d 4c 2b db e3 b8 7c |{.=.......L+...||
orderer0.example.com | 00000020 59 66 16 b7 43 02 20 5b 22 8c a4 5f 2d 29 ce 2a |Yf..C. [".._-).*|
orderer0.example.com | 00000030 06 2a e7 40 11 06 2c 8a fa 8e 0f 7d 06 6d c8 6a |.*.@..,....}.m.j|
orderer0.example.com | 00000040 02 1e e9 38 eb 37 57 |...8.7W|"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [cauthdsl] func2 -> DEBU 18ee 0xc000b24fa0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [cauthdsl] func1 -> DEBU 18ef 0xc000b24fa0 gate 1556789288112574500 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f2 Signature set satisfies policy /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [gossip.comm] Send -> DEBU 14fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.226 UTC [gossip.discovery] sendMemResponse -> DEBU 14fe Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:33.226 UTC [gossip.comm] sendToEndpoint -> DEBU 14ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.227 UTC [gossip.comm] sendToEndpoint -> DEBU 1500 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [endorser] ProcessProposal -> DEBU 1501 Entering: request from 172.18.0.8:57304"
peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] ValidateProposalMessage -> DEBU 1502 ValidateProposalMessage starts for signed proposal 0xc0034f8be0"
peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] validateChannelHeader -> DEBU 1503 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] checkSignatureFromCreator -> DEBU 1504 begin"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp] GetManagerForChain -> DEBU 1505 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1506 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1507 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1508 Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$|
peer0.org1.example.com | 00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1509 Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.|
peer0.org1.example.com | 00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....|
peer0.org1.example.com | 00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.|
peer0.org1.example.com | 00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I|
peer0.org1.example.com | 00000040 93 c4 68 25 75 40 |..h%u@|"
peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 150a exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150b validateChaincodeProposalMessage starts for proposal 0xc002cdc1c0, header 0xc0034f8ff0"
peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [endorser] preProcess -> DEBU 150d [businesschannel][a1db414e] processing txid: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db"
peer0.org1.example.com | "2019-05-02 09:27:33.310 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 150e retrieveTransactionByID() - txId = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]"
peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 150f constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1510 constructing new tx simulator txid = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]"
peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [endorser] SimulateProposal -> DEBU 1511 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:33.312 UTC [endorser] callChaincode -> INFO 1512 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [chaincode] Execute -> DEBU 1513 Entry"
peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [aclmgmt] CheckACL -> DEBU 1514 acl policy not found in config for resource _lifecycle/QueryApprovalStatus"
peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [policies] Evaluate -> DEBU 1515 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1516 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1517 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func1 -> DEBU 1518 0xc003285550 gate 1556789253314302900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 1519 0xc003285550 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151a 0xc003285550 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151b 0xc003285550 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [msp.identity] Verify -> DEBU 151c Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$|
peer0.org1.example.com | 00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|"
peer0.org1.example.com | "2019-05-02 09:27:33.315 UTC [msp.identity] Verify -> DEBU 151d Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.|
peer0.org1.example.com | 00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....|
peer0.org1.example.com | 00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.|
peer0.org1.example.com | 00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I|
peer0.org1.example.com | 00000040 93 c4 68 25 75 40 |..h%u@|"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [cauthdsl] func2 -> DEBU 151e 0xc003285550 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [cauthdsl] func1 -> DEBU 151f 0xc003285550 gate 1556789253314302900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1520 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1522 Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1523 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [lifecycle] QueryApprovalStatus -> DEBU 1524 received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: (<nil>)'"
peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] handleMessage -> DEBU 1525 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] HandleTransaction -> DEBU 1526 [a1db414e] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] HandleGetState -> DEBU 1527 [a1db414e] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [stateleveldb] GetState -> DEBU 1528 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleGetState -> DEBU 1529 [a1db414e] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152a [a1db414e] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] handleMessage -> DEBU 152b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.319 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 152d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.319 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152e retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152f retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1530 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1531 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1532 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1533 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1534 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1535 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1536 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1537 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.321 UTC [chaincode] HandleTransaction -> DEBU 1538 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.321 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1539 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [stateleveldb] GetState -> DEBU 153a GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [chaincode] HandleTransaction -> DEBU 153b [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [chaincode] handleMessage -> DEBU 153c [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [chaincode] HandleTransaction -> DEBU 153d [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.323 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 153e [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.323 UTC [stateleveldb] GetState -> DEBU 153f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:33.324 UTC [chaincode] HandleTransaction -> DEBU 1540 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.324 UTC [chaincode] handleMessage -> DEBU 1541 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.325 UTC [chaincode] HandleTransaction -> DEBU 1542 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.325 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1543 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [stateleveldb] GetState -> DEBU 1544 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [chaincode] HandleTransaction -> DEBU 1545 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [chaincode] handleMessage -> DEBU 1546 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 1547 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1548 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 1549 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154a [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] handleMessage -> DEBU 154b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 154d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 154e GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154f [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] handleMessage -> DEBU 1550 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] HandleTransaction -> DEBU 1551 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1552 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [stateleveldb] GetState -> DEBU 1553 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.114 UTC [common.deliver] deliverBlocks -> DEBU 18f6 [channel: businesschannel] Received seekInfo (0xc000089700) start:<specified:<number:4 > > stop:<specified:<number:4 > > from 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] Next -> DEBU 18f7 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] newBlockfileStream -> DEBU 18f8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]"
orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18f9 Remaining bytes=[57461], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fa Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}"
orderer0.example.com | "2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fb blockbytes [4707] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:08.116 UTC [common.deliver] deliverBlocks -> DEBU 18fc [channel: businesschannel] Delivering block [4] for (0xc000089700) for 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.117 UTC [common.deliver] deliverBlocks -> DEBU 18fd [channel: businesschannel] Done delivering to 172.18.0.8:57424 for (0xc000089700)"
orderer0.example.com | "2019-05-02 09:28:08.117 UTC [common.deliver] Handle -> DEBU 18fe Waiting for new SeekInfo from 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.118 UTC [common.deliver] Handle -> DEBU 18ff Attempting to read seek info message from 172.18.0.8:57424"
orderer0.example.com | "2019-05-02 09:28:08.124 UTC [common.deliver] Handle -> WARN 1900 Error reading from 172.18.0.8:57424: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:08.124 UTC [orderer.common.server] func1 -> DEBU 1901 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:08.124 UTC [comm.grpc.server] 1 -> INFO 1902 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57424 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6932ms
orderer0.example.com | "2019-05-02 09:28:08.124 UTC [grpc] infof -> DEBU 1903 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:08.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1904 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1905 Sending msg of 28 bytes to 3 on channel testchainid took 62.2µs"
orderer0.example.com | "2019-05-02 09:28:08.188 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1906 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.3498ms "
orderer0.example.com | "2019-05-02 09:28:08.367 UTC [orderer.common.server] Deliver -> DEBU 1907 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1908 Starting new deliver loop for 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1909 Attempting to read seek info message from 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 190e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 190f 0xc0011490b0 gate 1556789288369082600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1910 0xc0011490b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1911 0xc0011490b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1912 0xc0011490b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1913 0xc0011490b0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 1914 0xc0011490b0 gate 1556789288369082600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1915 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011498f0 gate 1556789288370152600 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 1919 0xc0011498f0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191a 0xc0011498f0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191b 0xc0011498f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191c 0xc0011498f0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 191d 0xc0011498f0 gate 1556789288370152600 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1921 0xc0012aa130 gate 1556789288371194200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1922 0xc0012aa130 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1923 0xc0012aa130 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1924 0xc0012aa130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1925 0xc0012aa130 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [chaincode] HandleTransaction -> DEBU 1554 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [lifecycle] QueryApprovalStatus -> INFO 1555 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [chaincode] handleMessage -> DEBU 1556 [a1db414e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [chaincode] Notify -> DEBU 1557 [a1db414e] notifying Txid:a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [chaincode] Execute -> DEBU 1558 Exit"
peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [endorser] callChaincode -> INFO 1559 [businesschannel][a1db414e] Exit chaincode: name:"_lifecycle" (18ms)"
peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 155a Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] Done -> DEBU 155b Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]"
peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] SimulateProposal -> DEBU 155c [businesschannel][a1db414e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155d [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155e [businesschannel][a1db414e] escc for chaincode name:"_lifecycle" is escc"
peer0.org1.example.com | "2019-05-02 09:27:33.332 UTC [endorser] EndorseWithPlugin -> DEBU 155f Entering endorsement for {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:33.332 UTC [msp.identity] Sign -> DEBU 1560 Sign: plaintext: 0A20FE47358EC6EE2717181BAAE7A5DD...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [msp.identity] Sign -> DEBU 1561 Sign: digest: E84B2A758A10207F6988F7971A0D08DF14F8A20D2AACD352036244DEEC74E504 "
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] EndorseWithPlugin -> DEBU 1562 Exiting {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] endorseProposal -> DEBU 1563 [businesschannel][a1db414e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [lockbasedtxmgr] Done -> DEBU 1564 Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]"
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] func1 -> DEBU 1565 Exit: request from 172.18.0.8:57304"
peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [comm.grpc.server] 1 -> INFO 1566 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57304 grpc.code=OK grpc.call_duration=26.7171ms
peer0.org1.example.com | "2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1567 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1568 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:33.843 UTC [gossip.comm] func1 -> DEBU 1569 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 156d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 156f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1570 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1571 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [policies] Evaluate -> DEBU 1572 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1573 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1574 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 1575 0xc002f68bf0 gate 1556789253845145500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1576 0xc002f68bf0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1577 0xc002f68bf0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1578 0xc002f68bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1579 0xc002f68bf0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157a 0xc002f68bf0 gate 1556789253845145500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157e 0xc002f69430 gate 1556789253845739000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 157f 0xc002f69430 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1580 0xc002f69430 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1581 0xc002f69430 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1582 Verify: digest = 00000000 2b 3e bf 3c d1 b2 64 f0 70 4c f9 b0 6e ea d0 e5 |+>.<..d.pL..n...|
peer0.org1.example.com | 00000010 ff 3c 9a 63 3a ea bc f6 31 a6 95 57 dc 29 74 da |.<.c:...1..W.)t.|"
peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1583 Verify: sig = 00000000 30 45 02 21 00 8e 4c 76 39 ba 6b f2 fd 62 b9 c6 |0E.!..Lv9.k..b..|
peer0.org1.example.com | 00000010 ba fc 1f 80 18 a5 6e 70 3f 8b a7 df cc 26 15 82 |......np?....&..|
peer0.org1.example.com | 00000020 fa 66 48 7b 5d 02 20 38 c5 34 41 a8 97 b5 b3 bc |.fH{]. 8.4A.....|
peer0.org1.example.com | 00000030 d3 02 4b c8 69 ac c2 a7 cf f0 9f d4 3e cd c3 4a |..K.i.......>..J|
peer0.org1.example.com | 00000040 12 19 e4 c7 94 1a 2b |......+|"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [cauthdsl] func2 -> DEBU 1584 0xc002f69430 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [cauthdsl] func1 -> DEBU 1585 0xc002f69430 gate 1556789253845739000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1586 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1588 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 158a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1590 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1591 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1592 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1593 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1594 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1595 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1596 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1597 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [gossip.comm] Send -> DEBU 1598 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.849 UTC [msp] DeserializeIdentity -> DEBU 1599 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.850 UTC [msp] DeserializeIdentity -> DEBU 159a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1926 0xc0012aa130 gate 1556789288371194200 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1927 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] func1 -> DEBU 1929 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192a Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func1 -> DEBU 192f 0xc0012aae20 gate 1556789288372680300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1930 0xc0012aae20 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1931 0xc0012aae20 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1932 0xc0012aae20 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1933 Verify: digest = 00000000 26 1a 16 4a 19 d4 86 3d 03 22 b3 a2 1f 33 e9 69 |&..J...=."...3.i|
orderer0.example.com | 00000010 fd b7 00 f1 5f 78 fa ab 4f 2e fd c2 07 76 3c 3d |...._x..O....v<=|"
orderer0.example.com | "2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1934 Verify: sig = 00000000 30 45 02 21 00 c5 8c 3a 37 ba 81 8d b7 59 86 9a |0E.!...:7....Y..|
orderer0.example.com | 00000010 63 89 0d 6a d7 64 62 8a 3a 73 9f 9a 16 26 75 db |c..j.db.:s...&u.|
orderer0.example.com | 00000020 7a 26 ce 8d 84 02 20 11 5a ae 96 60 5b f7 42 bd |z&.... .Z..`[.B.|
orderer0.example.com | 00000030 1e 44 57 d5 1a ca 94 cb 3d 7c 4a d1 bd ad 9e 9d |.DW.....=|J.....|
orderer0.example.com | 00000040 ef 30 c6 b7 af 8b b2 |.0.....|"
orderer0.example.com | "2019-05-02 09:28:08.373 UTC [cauthdsl] func2 -> DEBU 1935 0xc0012aae20 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:08.373 UTC [cauthdsl] func1 -> DEBU 1936 0xc0012aae20 gate 1556789288372680300 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:08.373 UTC [policies] Evaluate -> DEBU 1937 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1938 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1939 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193b Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [common.deliver] deliverBlocks -> DEBU 193d [channel: businesschannel] Received seekInfo (0xc0002209c0) start:<specified:<number:5 > > stop:<specified:<number:5 > > from 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.374 UTC [fsblkstorage] Next -> DEBU 193e Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] newBlockfileStream -> DEBU 193f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]"
orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1940 Remaining bytes=[52752], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1941 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}"
orderer0.example.com | "2019-05-02 09:28:08.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1942 blockbytes [5709] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1943 [channel: businesschannel] Delivering block [5] for (0xc0002209c0) for 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1944 [channel: businesschannel] Done delivering to 172.18.0.8:57426 for (0xc0002209c0)"
orderer0.example.com | "2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1945 Waiting for new SeekInfo from 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1946 Attempting to read seek info message from 172.18.0.8:57426"
orderer0.example.com | "2019-05-02 09:28:08.389 UTC [common.deliver] Handle -> WARN 1947 Error reading from 172.18.0.8:57426: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:08.389 UTC [orderer.common.server] func1 -> DEBU 1948 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:08.391 UTC [comm.grpc.server] 1 -> INFO 1949 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57426 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7817ms
orderer0.example.com | "2019-05-02 09:28:08.392 UTC [grpc] infof -> DEBU 194a transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194b Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs"
orderer0.example.com | "2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194c Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs"
orderer0.example.com | "2019-05-02 09:28:08.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 776.4µs "
orderer0.example.com | "2019-05-02 09:28:08.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.4µs "
orderer0.example.com | "2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 194f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1950 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.597 UTC [orderer.common.server] Deliver -> DEBU 1951 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1952 Starting new deliver loop for 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1953 Attempting to read seek info message from 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1954 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] Send -> DEBU 159c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.gossip] handleMessage -> DEBU 159f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.gossip] handleMessage -> DEBU 15a0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.comm] sendToEndpoint -> DEBU 15a1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.060 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 15a8 Sleeping 25s"
peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15a9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151015 "
peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15aa Sign: digest: A904CBD01281C429B6BD28A7567973D0E1230141D1B53B01D4A9F9990D525EAF "
peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15ab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:34.073 UTC [msp.identity] Sign -> DEBU 15ac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:34.073 UTC [gossip.discovery] periodicalSendAlive -> DEBU 15ad Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15ae Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15af Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.084 UTC [msp] DeserializeIdentity -> DEBU 15b0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.084 UTC [gossip.comm] Send -> DEBU 15b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [gossip.comm] Send -> DEBU 15b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [msp] DeserializeIdentity -> DEBU 15b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] Send -> DEBU 15b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [gossip.comm] sendToEndpoint -> DEBU 15b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.089 UTC [gossip.comm] sendToEndpoint -> DEBU 15ba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.113 UTC [endorser] ProcessProposal -> DEBU 15bb Entering: request from 172.18.0.8:57312"
peer0.org1.example.com | "2019-05-02 09:27:34.113 UTC [protoutils] ValidateProposalMessage -> DEBU 15bc ValidateProposalMessage starts for signed proposal 0xc00355aaf0"
peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] validateChannelHeader -> DEBU 15bd validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15be begin"
peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15bf creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c0 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c1 Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...|
peer0.org1.example.com | 00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|"
peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c2 Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7|
peer0.org1.example.com | 00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....|
peer0.org1.example.com | 00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.|
peer0.org1.example.com | 00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].|
peer0.org1.example.com | 00000040 00 29 c4 b2 98 03 fa |.).....|"
peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c3 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c4 validateChaincodeProposalMessage starts for proposal 0xc002e0a9a0, header 0xc00355af00"
peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c5 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [endorser] preProcess -> DEBU 15c6 [][886fbd33] processing txid: 886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910"
peer0.org1.example.com | "2019-05-02 09:27:34.117 UTC [endorser] SimulateProposal -> DEBU 15c7 [][886fbd33] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [endorser] callChaincode -> INFO 15c8 [][886fbd33] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [chaincode] Execute -> DEBU 15c9 Entry"
peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [msp.identity] Verify -> DEBU 15ca Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...|
peer0.org1.example.com | 00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|"
peer0.org1.example.com | "2019-05-02 09:27:34.119 UTC [msp.identity] Verify -> DEBU 15cb Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7|
peer0.org1.example.com | 00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....|
peer0.org1.example.com | 00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.|
peer0.org1.example.com | 00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].|
peer0.org1.example.com | 00000040 00 29 c4 b2 98 03 fa |.).....|"
peer0.org1.example.com | "2019-05-02 09:27:34.119 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 15cc received invocation of QueryInstalledChaincodes"
peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] handleMessage -> DEBU 15cd [886fbd33] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] Notify -> DEBU 15ce [886fbd33] notifying Txid:886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910, channelID:"
peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] Execute -> DEBU 15cf Exit"
peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] callChaincode -> INFO 15d0 [][886fbd33] Exit chaincode: name:"_lifecycle" (3ms)"
peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] SimulateProposal -> DEBU 15d1 [][886fbd33] Exit"
peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] func1 -> DEBU 15d2 Exit: request from 172.18.0.8:57312"
peer0.org1.example.com | "2019-05-02 09:27:34.122 UTC [comm.grpc.server] 1 -> INFO 15d3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57312 grpc.code=OK grpc.call_duration=9.2835ms
peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d8 Verify: digest = 00000000 f5 f8 70 94 92 a1 f3 96 ff 1e a3 18 d5 20 fd 6a |..p.......... .j|
peer0.org1.example.com | 00000010 44 43 32 6c 49 91 f2 95 63 12 0d 8a cd 1d c4 e5 |DC2lI...c.......|"
peer0.org1.example.com | "2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d9 Verify: sig = 00000000 30 44 02 20 7d 7b c1 34 9a c2 05 4d d0 99 53 e6 |0D. }{.4...M..S.|
peer0.org1.example.com | 00000010 46 d8 6f e2 20 14 a8 88 de 9d 17 a4 b0 a0 3d 85 |F.o. .........=.|
peer0.org1.example.com | 00000020 e8 5b 92 50 02 20 2f 45 e4 54 cb bb 0e dd 8c 4d |.[.P. /E.T.....M|
peer0.org1.example.com | 00000030 ba 98 8f 12 48 7c bb fc 84 98 e1 f0 26 86 d8 ff |....H|......&...|
peer0.org1.example.com | 00000040 2e 37 1f ee 0e 99 |.7....|"
peer0.org1.example.com | "2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15da Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15db Verify: sig = 00000000 30 45 02 21 00 d9 f4 41 57 df d3 7f 27 e4 c0 85 |0E.!...AW...'...|
peer0.org1.example.com | 00000010 c5 ae 34 6a d0 3d 15 ce f5 80 7e c6 16 27 11 b2 |..4j.=....~..'..|
peer0.org1.example.com | 00000020 c0 36 f8 07 25 02 20 31 fd 8b 18 7b 21 df ad 48 |.6..%. 1...{!..H|
peer0.org1.example.com | 00000030 23 b7 f6 7d 63 9d 2a 11 d7 1a 83 1b 69 70 ac 92 |#..}c.*.....ip..|
peer0.org1.example.com | 00000040 a7 83 1b a9 31 64 42 |....1dB|"
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15dd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15de updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15df Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15e2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15e3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [gossip.comm] Send -> DEBU 15e7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.134 UTC [msp] DeserializeIdentity -> DEBU 15e8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.134 UTC [gossip.comm] Send -> DEBU 15e9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15ea Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15eb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ed Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.comm] func1 -> DEBU 15ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15ef Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [grpc] infof -> DEBU 15f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [grpc] infof -> DEBU 15f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15fa Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [msp] DeserializeIdentity -> DEBU 15fd Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1955 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1956 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1957 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1958 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [cauthdsl] func1 -> DEBU 1959 0xc0011594d0 gate 1556789288599854200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.599 UTC [cauthdsl] func2 -> DEBU 195a 0xc0011594d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.600 UTC [cauthdsl] func2 -> DEBU 195b 0xc0011594d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195c 0xc0011594d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195d 0xc0011594d0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func1 -> DEBU 195e 0xc0011594d0 gate 1556789288599854200 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 195f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1960 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1961 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1962 0xc001159d10 gate 1556789288602276900 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1963 0xc001159d10 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1964 0xc001159d10 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1965 0xc001159d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1966 0xc001159d10 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1967 0xc001159d10 gate 1556789288602276900 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1968 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 196a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func1 -> DEBU 196b 0xc001022670 gate 1556789288603411200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196c 0xc001022670 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196d 0xc001022670 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196e 0xc001022670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [cauthdsl] func2 -> DEBU 196f 0xc001022670 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [cauthdsl] func1 -> DEBU 1970 0xc001022670 gate 1556789288603411200 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1971 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] func1 -> DEBU 1973 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1974 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1975 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1978 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func1 -> DEBU 1979 0xc001023360 gate 1556789288605625800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197a 0xc001023360 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197b 0xc001023360 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197c 0xc001023360 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 8b 4e c6 16 a0 ef d7 dd 19 51 2f 47 82 55 2f f8 |.N.......Q/G.U/.|
orderer0.example.com | 00000010 96 db 89 68 55 4b 6c 3f dd 3a b4 41 f4 29 d6 8e |...hUKl?.:.A.)..|"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 1d 83 da 52 84 8a 81 27 59 78 80 dd |0D. ...R...'Yx..|
orderer0.example.com | 00000010 d8 5e c3 49 19 39 7b 96 70 5e 6a d7 b4 26 87 6d |.^.I.9{.p^j..&.m|
orderer0.example.com | 00000020 04 f8 18 e9 02 20 31 7e 86 02 c0 e9 b5 08 f1 40 |..... 1~.......@|
orderer0.example.com | 00000030 1a 9f c3 5b 79 e0 13 79 40 00 49 47 c4 38 53 00 |...[y..y@.IG.8S.|
orderer0.example.com | 00000040 09 7a 0b 14 bc e0 |.z....|"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [cauthdsl] func2 -> DEBU 197f 0xc001023360 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [cauthdsl] func1 -> DEBU 1980 0xc001023360 gate 1556789288605625800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1981 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1982 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1983 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1985 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1986 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15ff Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1600 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1601 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1602 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1603 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func1 -> DEBU 1604 0xc0033301e0 gate 1556789254202182500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1605 0xc0033301e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1606 0xc0033301e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1607 0xc0033301e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:34.203 UTC [cauthdsl] func2 -> DEBU 1608 0xc0033301e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [cauthdsl] func1 -> DEBU 1609 0xc0033301e0 gate 1556789254202182500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.206 UTC [policies] Evaluate -> DEBU 160c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.216 UTC [gossip.comm] func1 -> DEBU 160d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.216 UTC [gossip.gossip] handleMessage -> DEBU 160e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.209 UTC [cauthdsl] func1 -> DEBU 160f 0xc003330a20 gate 1556789254209820800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1610 0xc003330a20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1611 0xc003330a20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [cauthdsl] func2 -> DEBU 1612 0xc003330a20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1613 Verify: digest = 00000000 9d d2 f3 f0 31 89 7e 29 b8 bc 9c bf 2d 06 77 44 |....1.~)....-.wD|
peer0.org1.example.com | 00000010 1d c6 07 c1 26 85 c9 8c 17 6d 0d 10 bd 50 13 e2 |....&....m...P..|"
peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1614 Verify: sig = 00000000 30 45 02 21 00 e0 01 43 20 01 73 83 de 1f 9c 5c |0E.!...C .s....\|
peer0.org1.example.com | 00000010 aa 34 75 d6 c1 80 39 2d a2 35 41 b1 89 7d 8a b7 |.4u...9-.5A..}..|
peer0.org1.example.com | 00000020 6c 65 3f b5 9a 02 20 4f de c9 b2 a3 e4 43 85 f6 |le?... O.....C..|
peer0.org1.example.com | 00000030 de 4b 43 51 6f 91 58 05 02 bc d7 b5 96 89 45 2d |.KCQo.X.......E-|
peer0.org1.example.com | 00000040 94 ad e4 9c cc 75 81 |.....u.|"
peer0.org1.example.com | "2019-05-02 09:27:34.222 UTC [cauthdsl] func2 -> DEBU 1615 0xc003330a20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [cauthdsl] func1 -> DEBU 1616 0xc003330a20 gate 1556789254209820800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1617 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1619 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 161a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 161b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 "
peer0.org1.example.com | "2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 "
orderer0.example.com | "2019-05-02 09:28:08.607 UTC [common.deliver] deliverBlocks -> DEBU 1987 [channel: businesschannel] Received seekInfo (0xc000bb0100) start:<specified:<number:6 > > stop:<specified:<number:6 > > from 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] Next -> DEBU 1988 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] newBlockfileStream -> DEBU 1989 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198a Remaining bytes=[47041], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198b Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198c blockbytes [4060] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:08.608 UTC [common.deliver] deliverBlocks -> DEBU 198d [channel: businesschannel] Delivering block [6] for (0xc000bb0100) for 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.609 UTC [common.deliver] deliverBlocks -> DEBU 198e [channel: businesschannel] Done delivering to 172.18.0.8:57428 for (0xc000bb0100)"
orderer0.example.com | "2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 198f Waiting for new SeekInfo from 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 1990 Attempting to read seek info message from 172.18.0.8:57428"
orderer0.example.com | "2019-05-02 09:28:08.617 UTC [common.deliver] Handle -> WARN 1991 Error reading from 172.18.0.8:57428: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:08.617 UTC [orderer.common.server] func1 -> DEBU 1992 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:08.617 UTC [comm.grpc.server] 1 -> INFO 1993 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57428 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0819ms
orderer0.example.com | "2019-05-02 09:28:08.617 UTC [grpc] infof -> DEBU 1994 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:08.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1995 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1996 Sending msg of 28 bytes to 3 on channel testchainid took 47.6µs"
orderer0.example.com | "2019-05-02 09:28:08.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1997 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1148ms "
orderer0.example.com | "2019-05-02 09:28:08.835 UTC [orderer.common.server] Deliver -> DEBU 1998 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 1999 Starting new deliver loop for 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 199a Attempting to read seek info message from 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a0 0xc000cfe020 gate 1556789288836977200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000cfe020 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000cfe020 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a3 0xc000cfe020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a4 0xc000cfe020 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a5 0xc000cfe020 gate 1556789288836977200 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.837 UTC [policies] Evaluate -> DEBU 19a6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.838 UTC [cauthdsl] func1 -> DEBU 19a9 0xc000cfe860 gate 1556789288838884000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19aa 0xc000cfe860 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ab 0xc000cfe860 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ac 0xc000cfe860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000cfe860 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func1 -> DEBU 19ae 0xc000cfe860 gate 1556789288838884000 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19af Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func1 -> DEBU 19b2 0xc000cff0a0 gate 1556789288840215000 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b3 0xc000cff0a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b4 0xc000cff0a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b5 0xc000cff0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [cauthdsl] func2 -> DEBU 19b6 0xc000cff0a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [cauthdsl] func1 -> DEBU 19b7 0xc000cff0a0 gate 1556789288840215000 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] learnExistingMembers -> DEBU 1620 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1622 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.gossip] handleMessage -> DEBU 1623 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1624 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1625 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1626 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1627 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1628 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 1629 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 162a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.234 UTC [msp] DeserializeIdentity -> DEBU 162b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1630 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1631 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1632 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1633 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1634 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1635 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1636 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1637 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:34.413 UTC [endorser] ProcessProposal -> DEBU 1638 Entering: request from 172.18.0.8:57316"
peer0.org1.example.com | "2019-05-02 09:27:34.414 UTC [protoutils] ValidateProposalMessage -> DEBU 1639 ValidateProposalMessage starts for signed proposal 0xc003758870"
peer0.org1.example.com | "2019-05-02 09:27:34.414 UTC [protoutils] validateChannelHeader -> DEBU 163a validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163b begin"
peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [msp] GetManagerForChain -> DEBU 163c Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [protoutils] checkSignatureFromCreator -> DEBU 163e creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 163f Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....|
peer0.org1.example.com | 00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|"
peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 1640 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..|
peer0.org1.example.com | 00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t|
peer0.org1.example.com | 00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F|
peer0.org1.example.com | 00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.||
peer0.org1.example.com | 00000040 3f 89 3f c3 ef 3f |?.?..?|"
peer0.org1.example.com | "2019-05-02 09:27:34.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1641 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:34.417 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1642 validateChaincodeProposalMessage starts for proposal 0xc002cdccb0, header 0xc003758cd0"
peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1643 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [endorser] preProcess -> DEBU 1644 [businesschannel][f6f68e79] processing txid: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1"
peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1645 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]"
peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1646 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:34.419 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1647 constructing new tx simulator txid = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]"
peer0.org1.example.com | "2019-05-02 09:27:34.419 UTC [endorser] SimulateProposal -> DEBU 1648 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [endorser] callChaincode -> INFO 1649 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [chaincode] Execute -> DEBU 164a Entry"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] func1 -> DEBU 19ba Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bb Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func1 -> DEBU 19c0 0xc000cffd90 gate 1556789288842186500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c1 0xc000cffd90 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c2 0xc000cffd90 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c3 0xc000cffd90 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c4 Verify: digest = 00000000 e2 16 b6 ce 94 50 34 28 06 48 7a b1 5e f2 cd 8e |.....P4(.Hz.^...|
orderer0.example.com | 00000010 80 b4 3b 07 ab 70 cf 34 4e 52 0c b6 98 fb 52 a9 |..;..p.4NR....R.|"
orderer0.example.com | "2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c5 Verify: sig = 00000000 30 45 02 21 00 d4 74 bd 8d 7a df 79 41 c8 c5 a6 |0E.!..t..z.yA...|
orderer0.example.com | 00000010 92 b7 73 62 98 3f ec 22 40 24 b2 47 b1 b8 d4 f4 |..sb.?."@$.G....|
orderer0.example.com | 00000020 b0 08 ac bf f7 02 20 60 f4 8b 7e 8e 90 79 55 ef |...... `..~..yU.|
orderer0.example.com | 00000030 53 32 f6 34 30 4a 85 54 32 ad f6 1b 92 a8 e3 9f |S2.40J.T2.......|
orderer0.example.com | 00000040 1c 0d e4 6d b6 c5 03 |...m...|"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [cauthdsl] func2 -> DEBU 19c6 0xc000cffd90 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [cauthdsl] func1 -> DEBU 19c7 0xc000cffd90 gate 1556789288842186500 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19ca Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cc Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:08.844 UTC [common.deliver] deliverBlocks -> DEBU 19ce [channel: businesschannel] Received seekInfo (0xc000221840) start:<specified:<number:7 > > stop:<specified:<number:7 > > from 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.844 UTC [fsblkstorage] Next -> DEBU 19cf Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:08.844 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]"
orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d1 Remaining bytes=[42979], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d2 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}"
orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d3 blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:08.845 UTC [common.deliver] deliverBlocks -> DEBU 19d4 [channel: businesschannel] Delivering block [7] for (0xc000221840) for 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] deliverBlocks -> DEBU 19d5 [channel: businesschannel] Done delivering to 172.18.0.8:57430 for (0xc000221840)"
orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d6 Waiting for new SeekInfo from 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d7 Attempting to read seek info message from 172.18.0.8:57430"
orderer0.example.com | "2019-05-02 09:28:08.853 UTC [common.deliver] Handle -> WARN 19d8 Error reading from 172.18.0.8:57430: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:08.854 UTC [orderer.common.server] func1 -> DEBU 19d9 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:08.856 UTC [comm.grpc.server] 1 -> INFO 19da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57430 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.8614ms
orderer0.example.com | "2019-05-02 09:28:08.856 UTC [grpc] infof -> DEBU 19db transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dc Sending msg of 28 bytes to 2 on channel businesschannel took 59.5µs"
orderer0.example.com | "2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel businesschannel took 31.7µs"
orderer0.example.com | "2019-05-02 09:28:08.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 589.2µs "
orderer0.example.com | "2019-05-02 09:28:08.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 395.8µs "
orderer0.example.com | "2019-05-02 09:28:08.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:08.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.050 UTC [orderer.common.server] Deliver -> DEBU 19e2 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e3 Starting new deliver loop for 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e4 Attempting to read seek info message from 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164b acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition"
peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164c acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [policies] Evaluate -> DEBU 164f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [cauthdsl] func1 -> DEBU 1650 0xc00252b340 gate 1556789254422484900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [cauthdsl] func2 -> DEBU 1651 0xc00252b340 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1652 0xc00252b340 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1653 0xc00252b340 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....|
peer0.org1.example.com | 00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|"
peer0.org1.example.com | "2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..|
peer0.org1.example.com | 00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t|
peer0.org1.example.com | 00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F|
peer0.org1.example.com | 00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.||
peer0.org1.example.com | 00000040 3f 89 3f c3 ef 3f |?.?..?|"
peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [cauthdsl] func2 -> DEBU 1656 0xc00252b340 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [cauthdsl] func1 -> DEBU 1657 0xc00252b340 gate 1556789254422484900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [policies] Evaluate -> DEBU 1658 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 1659 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165a Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 165c received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>)'"
peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [chaincode] handleMessage -> DEBU 165d [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [chaincode] HandleTransaction -> DEBU 165e [f6f68e79] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 165f [f6f68e79] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1660 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 1661 [f6f68e79] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1662 [f6f68e79] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] handleMessage -> DEBU 1663 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1664 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1665 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1666 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1667 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > ]"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1668 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1669 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166a [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166b [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 166c [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 166d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166e [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166f [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1670 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1671 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1672 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1673 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1674 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1675 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1676 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1677 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1678 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1679 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 167a [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 167b [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 167c GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167d [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 167e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167f [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1680 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 1681 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 1682 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 1683 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [chaincode] HandleTransaction -> DEBU 1684 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1685 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [stateleveldb] GetState -> DEBU 1686 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:34.432 UTC [chaincode] HandleTransaction -> DEBU 1687 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.433 UTC [chaincode] handleMessage -> DEBU 1688 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.433 UTC [chaincode] HandleTransaction -> DEBU 1689 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.434 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 168a [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.434 UTC [stateleveldb] GetState -> DEBU 168b GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:34.435 UTC [chaincode] HandleTransaction -> DEBU 168c [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.435 UTC [lifecycle] QueryApprovalStatus -> INFO 168d successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:34.436 UTC [chaincode] handleMessage -> DEBU 168e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.436 UTC [chaincode] HandleTransaction -> DEBU 168f [f6f68e79] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.437 UTC [chaincode] HandleGetState -> DEBU 1690 [f6f68e79] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.437 UTC [stateleveldb] GetState -> DEBU 1691 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:34.438 UTC [chaincode] HandleGetState -> DEBU 1692 [f6f68e79] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload"
peer0.org1.example.com | "2019-05-02 09:27:34.438 UTC [chaincode] HandleTransaction -> DEBU 1693 [f6f68e79] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.439 UTC [chaincode] handleMessage -> DEBU 1694 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.439 UTC [chaincode] HandleTransaction -> DEBU 1695 [f6f68e79] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.440 UTC [chaincode] HandleTransaction -> DEBU 1696 [f6f68e79] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.440 UTC [chaincode] handleMessage -> DEBU 1697 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1698 [f6f68e79] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1699 [f6f68e79] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.442 UTC [chaincode] handleMessage -> DEBU 169a [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169b [f6f68e79] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169c [f6f68e79] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] handleMessage -> DEBU 169d [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169e [f6f68e79] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169f [f6f68e79] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.445 UTC [chaincode] handleMessage -> DEBU 16a0 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.445 UTC [chaincode] HandleTransaction -> DEBU 16a1 [f6f68e79] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [chaincode] HandleTransaction -> DEBU 16a2 [f6f68e79] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [lifecycle] CommitChaincodeDefinition -> INFO 16a3 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'"
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [cauthdsl] func1 -> DEBU 19ea 0xc0011ca090 gate 1556789289051899400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.051 UTC [cauthdsl] func2 -> DEBU 19eb 0xc0011ca090 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ec 0xc0011ca090 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ed 0xc0011ca090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ee 0xc0011ca090 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func1 -> DEBU 19ef 0xc0011ca090 gate 1556789289051899400 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.054 UTC [cauthdsl] func1 -> DEBU 19f3 0xc0011ca8d0 gate 1556789289054104300 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.054 UTC [cauthdsl] func2 -> DEBU 19f4 0xc0011ca8d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f5 0xc0011ca8d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f6 0xc0011ca8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f7 0xc0011ca8d0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.057 UTC [cauthdsl] func1 -> DEBU 19f8 0xc0011ca8d0 gate 1556789289054104300 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func1 -> DEBU 19fc 0xc0011cb110 gate 1556789289058056700 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0011cb110 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0011cb110 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19ff 0xc0011cb110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 1a00 0xc0011cb110 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a01 0xc0011cb110 gate 1556789289058056700 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a02 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] func1 -> DEBU 1a04 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a05 Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a07 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a08 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a09 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0011cbe00 gate 1556789289059921200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0b 0xc0011cbe00 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0c 0xc0011cbe00 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc0011cbe00 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0e Verify: digest = 00000000 67 7d 0f 6f 26 08 a9 e7 a0 6b 81 16 cf 2d 64 28 |g}.o&....k...-d(|
orderer0.example.com | 00000010 4c d2 f4 11 f9 8c 65 76 62 67 d2 58 81 43 be a1 |L.....evbg.X.C..|"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0f Verify: sig = 00000000 30 44 02 20 11 8c bc c0 a6 5f 6d b8 ca 62 06 de |0D. ....._m..b..|
orderer0.example.com | 00000010 2c 1c d1 fc 1a 37 24 20 16 03 61 60 41 d4 15 93 |,....7$ ..a`A...|
orderer0.example.com | 00000020 34 f6 e1 53 02 20 45 f6 3e 83 9d 53 c7 5f f7 e4 |4..S. E.>..S._..|
orderer0.example.com | 00000030 78 fb 64 3d 6f c1 66 ee 5d 59 14 3e df 3d fc 42 |x.d=o.f.]Y.>.=.B|
orderer0.example.com | 00000040 07 33 26 3c b2 cf |.3&<..|"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0011cbe00 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func1 -> DEBU 1a11 0xc0011cbe00 gate 1556789289059921200 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a12 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a14 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a16 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [policies] Evaluate -> DEBU 1a17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [common.deliver] deliverBlocks -> DEBU 1a18 [channel: businesschannel] Received seekInfo (0xc000bb0840) start:<specified:<number:8 > > stop:<specified:<number:8 > > from 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] Next -> DEBU 1a19 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a1a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1b Remaining bytes=[38928], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1c Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}"
orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1d blockbytes [4049] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1e [channel: businesschannel] Delivering block [8] for (0xc000bb0840) for 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1f [channel: businesschannel] Done delivering to 172.18.0.8:57432 for (0xc000bb0840)"
orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a20 Waiting for new SeekInfo from 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a21 Attempting to read seek info message from 172.18.0.8:57432"
orderer0.example.com | "2019-05-02 09:28:09.089 UTC [common.deliver] Handle -> WARN 1a22 Error reading from 172.18.0.8:57432: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:09.090 UTC [orderer.common.server] func1 -> DEBU 1a23 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:09.090 UTC [comm.grpc.server] 1 -> INFO 1a24 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57432 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.0645ms
orderer0.example.com | "2019-05-02 09:28:09.092 UTC [grpc] infof -> DEBU 1a25 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a26 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a27 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs"
orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a28 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs "
orderer0.example.com | "2019-05-02 09:28:09.302 UTC [orderer.common.server] Deliver -> DEBU 1a29 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2a Starting new deliver loop for 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2b Attempting to read seek info message from 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a30 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.303 UTC [cauthdsl] func1 -> DEBU 1a31 0xc0012046a0 gate 1556789289303922500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a32 0xc0012046a0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a33 0xc0012046a0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a34 0xc0012046a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a35 0xc0012046a0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a36 0xc0012046a0 gate 1556789289303922500 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a37 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a3a 0xc001204ee0 gate 1556789289304846800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc001204ee0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc001204ee0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc001204ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc001204ee0 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc001204ee0 gate 1556789289304846800 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a43 0xc001205720 gate 1556789289305659700 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a44 0xc001205720 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a45 0xc001205720 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a46 0xc001205720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a47 0xc001205720 principal evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a48 0xc001205720 gate 1556789289305659700 evaluation fails"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a49 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] func1 -> DEBU 1a4b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4c Signature set did not satisfy policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [chaincode] handleMessage -> DEBU 16a4 [f6f68e79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [chaincode] Notify -> DEBU 16a5 [f6f68e79] notifying Txid:f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [chaincode] Execute -> DEBU 16a6 Exit"
peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [endorser] callChaincode -> INFO 16a7 [businesschannel][f6f68e79] Exit chaincode: name:"_lifecycle" (27ms)"
peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 16a8 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [lockbasedtxmgr] Done -> DEBU 16a9 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]"
peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [endorser] SimulateProposal -> DEBU 16aa [businesschannel][f6f68e79] Exit"
peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [endorser] endorseProposal -> DEBU 16ab [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [endorser] endorseProposal -> DEBU 16ac [businesschannel][f6f68e79] escc for chaincode name:"_lifecycle" is escc"
peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [endorser] EndorseWithPlugin -> DEBU 16ad Entering endorsement for {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [msp.identity] Sign -> DEBU 16ae Sign: plaintext: 0A20AF1811FEBE0A7A011CB75C185DAC...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [msp.identity] Sign -> DEBU 16af Sign: digest: 64E4B5318BFE5590738A9489AEECF0B08EDE71F592071BE975069271FB0687E1 "
peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [endorser] EndorseWithPlugin -> DEBU 16b0 Exiting {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [endorser] endorseProposal -> DEBU 16b1 [businesschannel][f6f68e79] Exit"
peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [lockbasedtxmgr] Done -> DEBU 16b2 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]"
peer0.org1.example.com | "2019-05-02 09:27:34.451 UTC [endorser] func1 -> DEBU 16b3 Exit: request from 172.18.0.8:57316"
peer0.org1.example.com | "2019-05-02 09:27:34.451 UTC [comm.grpc.server] 1 -> INFO 16b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57316 grpc.code=OK grpc.call_duration=38.3784ms
peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliverevents] DeliverFiltered -> DEBU 16b5 Starting new DeliverFiltered handler"
peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b6 Starting new deliver loop for 172.18.0.8:57318"
peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b7 Attempting to read seek info message from 172.18.0.8:57318"
peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b8 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock"
peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b9 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [policies] Evaluate -> DEBU 16bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func1 -> DEBU 16bd 0xc003799cb0 gate 1556789254477306600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16be 0xc003799cb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16bf 0xc003799cb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16c0 0xc003799cb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c1 Verify: digest = 00000000 8f 3c aa 80 37 34 90 21 ef 0a fb d6 96 8e ed 14 |.<..74.!........|
peer0.org1.example.com | 00000010 c1 f6 3f 46 d9 7d 30 b2 d7 40 38 7d fd c5 38 01 |..?F.}0..@8}..8.|"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c2 Verify: sig = 00000000 30 44 02 20 37 0e 61 4c c7 88 70 67 e3 d2 b7 e8 |0D. 7.aL..pg....|
peer0.org1.example.com | 00000010 63 ef ee c9 e4 60 d0 5f 5d 69 92 02 08 9e 85 b5 |c....`._]i......|
peer0.org1.example.com | 00000020 e7 b4 fb 21 02 20 05 6a b8 6d 96 58 f2 cc b8 a1 |...!. .j.m.X....|
peer0.org1.example.com | 00000030 8a 31 49 cf ae 27 77 69 53 9e e5 ff bf 2b 68 10 |.1I..'wiS....+h.|
peer0.org1.example.com | 00000040 25 88 ab 99 0b 31 |%....1|"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [cauthdsl] func2 -> DEBU 16c3 0xc003799cb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [cauthdsl] func1 -> DEBU 16c4 0xc003799cb0 gate 1556789254477306600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [common.deliver] deliverBlocks -> DEBU 16c9 [channel: businesschannel] Received seekInfo (0xc0034d26c0) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.8:57318"
peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] Next -> DEBU 16ca Initializing block stream for iterator. itr.maxBlockNumAvailable=4"
peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 16cb newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76084]"
peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cc Remaining bytes=[4710], Going to peek [8] bytes"
peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cd Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[76084], bytesOffset=[76086]}"
peer0.org1.example.com | "2019-05-02 09:27:34.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ce blockbytes [4708] read from file [0]"
peer0.org1.example.com | "2019-05-02 09:27:34.481 UTC [common.deliver] deliverBlocks -> DEBU 16cf [channel: businesschannel] Delivering block [4] for (0xc0034d26c0) for 172.18.0.8:57318"
peer0.org1.example.com | "2019-05-02 09:27:34.483 UTC [fsblkstorage] waitForBlock -> DEBU 16d0 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]"
peer0.org1.example.com | "2019-05-02 09:27:36.285 UTC [msp] DeserializeIdentity -> DEBU 16d1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.286 UTC [msp] DeserializeIdentity -> DEBU 16d2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] Send -> DEBU 16d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.289 UTC [gossip.comm] sendToEndpoint -> DEBU 16d7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.comm] func1 -> DEBU 16d9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.gossip] handleMessage -> DEBU 16da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16db Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16dd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16de Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e0 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e1 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [cauthdsl] func1 -> DEBU 16e5 0xc00312c4c0 gate 1556789256291919500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00312c4c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00312c4c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00312c4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e9 0xc00312c4c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ea 0xc00312c4c0 gate 1556789256291919500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ee 0xc00312cd00 gate 1556789256292456700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00312cd00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00312cd00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00312cd00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f2 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a50 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a51 0xc001214410 gate 1556789289306716700 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a52 0xc001214410 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a53 0xc001214410 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.307 UTC [cauthdsl] func2 -> DEBU 1a54 0xc001214410 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a55 Verify: digest = 00000000 8f 16 74 7b 1e 49 2c 40 21 57 2b 1b 61 bf c7 b1 |..t{.I,@!W+.a...|
orderer0.example.com | 00000010 7c 17 e3 76 af 02 42 cf 66 69 83 5a 15 e3 3e 25 ||..v..B.fi.Z..>%|"
orderer0.example.com | "2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a56 Verify: sig = 00000000 30 45 02 21 00 f3 cc 57 3c b2 77 c7 79 4f 4e c7 |0E.!...W<.w.yON.|
orderer0.example.com | 00000010 f3 da 70 61 58 9c d9 68 ec a2 cd 46 05 a8 3d bd |..paX..h...F..=.|
orderer0.example.com | 00000020 a3 24 d8 68 f6 02 20 69 93 7c f3 b4 d3 18 74 c3 |.$.h.. i.|....t.|
orderer0.example.com | 00000030 92 5c 3d 60 8a 19 25 ca ff fe be 17 61 d9 a1 ee |.\=`..%.....a...|
orderer0.example.com | 00000040 74 e8 49 e0 be 0d ba |t.I....|"
orderer0.example.com | "2019-05-02 09:28:09.308 UTC [cauthdsl] func2 -> DEBU 1a57 0xc001214410 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:09.308 UTC [cauthdsl] func1 -> DEBU 1a58 0xc001214410 gate 1556789289306716700 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:09.308 UTC [policies] Evaluate -> DEBU 1a59 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5b Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5d Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.310 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.310 UTC [common.deliver] deliverBlocks -> DEBU 1a5f [channel: businesschannel] Received seekInfo (0xc0000c09c0) start:<specified:<number:9 > > stop:<specified:<number:9 > > from 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.310 UTC [fsblkstorage] Next -> DEBU 1a60 Initializing block stream for iterator. itr.maxBlockNumAvailable=9"
orderer0.example.com | "2019-05-02 09:28:09.310 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a61 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]"
orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a62 Remaining bytes=[34877], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a63 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}"
orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a64 blockbytes [34874] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a65 [channel: businesschannel] Delivering block [9] for (0xc0000c09c0) for 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a66 [channel: businesschannel] Done delivering to 172.18.0.8:57434 for (0xc0000c09c0)"
orderer0.example.com | "2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a67 Waiting for new SeekInfo from 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a68 Attempting to read seek info message from 172.18.0.8:57434"
orderer0.example.com | "2019-05-02 09:28:09.326 UTC [common.deliver] Handle -> WARN 1a69 Error reading from 172.18.0.8:57434: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:09.326 UTC [orderer.common.server] func1 -> DEBU 1a6a Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:09.326 UTC [comm.grpc.server] 1 -> INFO 1a6b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57434 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0824ms
orderer0.example.com | "2019-05-02 09:28:09.326 UTC [grpc] infof -> DEBU 1a6c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6d Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs"
orderer0.example.com | "2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6e Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs"
orderer0.example.com | "2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs "
orderer0.example.com | "2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs "
orderer0.example.com | "2019-05-02 09:28:09.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a72 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.537 UTC [orderer.common.server] Deliver -> DEBU 1a73 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a74 Starting new deliver loop for 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a75 Attempting to read seek info message from 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a7a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.539 UTC [cauthdsl] func1 -> DEBU 1a7b 0xc0012314d0 gate 1556789289539922500 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0012314d0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0012314d0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0012314d0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a7f Verify: digest = 00000000 01 78 be 83 04 ac 35 24 c3 f0 da a0 9f 39 81 c0 |.x....5$.....9..|
orderer0.example.com | 00000010 ee 4c 56 24 fa 75 c9 2d 59 9b bf 24 b1 b7 9f 81 |.LV$.u.-Y..$....|"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a80 Verify: sig = 00000000 30 44 02 20 2e ac fd 06 07 30 85 57 fb 65 37 db |0D. .....0.W.e7.|
orderer0.example.com | 00000010 24 88 4a 42 cd ff 05 2a fe 95 a2 05 84 f2 af b4 |$.JB...*........|
orderer0.example.com | 00000020 2b 59 cf d1 02 20 6e 7a 19 11 8a ae 2a 0b 35 ef |+Y... nz....*.5.|
orderer0.example.com | 00000030 a1 c7 e4 d2 12 b5 c9 4f d9 12 a4 64 a4 80 0b 13 |.......O...d....|
orderer0.example.com | 00000040 81 93 8b c2 ef f9 |......|"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a81 0xc0012314d0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func1 -> DEBU 1a82 0xc0012314d0 gate 1556789289539922500 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a83 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a84 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a85 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a87 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.541 UTC [common.deliver] deliverBlocks -> DEBU 1a89 [channel: testchainid] Received seekInfo (0xc000bb1300) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] Next -> DEBU 1a8a Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8c Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8d Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8e blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:09.543 UTC [common.deliver] deliverBlocks -> DEBU 1a8f [channel: testchainid] Delivering block [1] for (0xc000bb1300) for 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.544 UTC [common.deliver] deliverBlocks -> DEBU 1a90 [channel: testchainid] Done delivering to 172.18.0.8:57436 for (0xc000bb1300)"
orderer0.example.com | "2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a91 Waiting for new SeekInfo from 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a92 Attempting to read seek info message from 172.18.0.8:57436"
orderer0.example.com | "2019-05-02 09:28:09.563 UTC [grpc] warningf -> DEBU 1a93 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57436: read: connection reset by peer"
orderer0.example.com | "2019-05-02 09:28:09.567 UTC [grpc] infof -> DEBU 1a94 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:09.569 UTC [common.deliver] Handle -> WARN 1a95 Error reading from 172.18.0.8:57436: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:09.569 UTC [orderer.common.server] func1 -> DEBU 1a96 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:09.571 UTC [comm.grpc.server] 1 -> INFO 1a97 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57436 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.3748ms
orderer0.example.com | "2019-05-02 09:28:09.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a98 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a99 Sending msg of 28 bytes to 3 on channel testchainid took 31.4µs"
orderer0.example.com | "2019-05-02 09:28:09.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 771.7µs "
orderer0.example.com | "2019-05-02 09:28:09.871 UTC [orderer.common.server] Deliver -> DEBU 1a9b Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9c Starting new deliver loop for 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9d Attempting to read seek info message from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.872 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc000f15130 gate 1556789289872980200 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc000f15130 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc000f15130 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000f15130 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa7 Verify: digest = 00000000 40 6b e9 74 a0 9b 03 41 c9 cf b9 71 26 01 d6 0b |@k.t...A...q&...|
orderer0.example.com | 00000010 ec 2d 32 f1 91 44 03 fe b9 54 71 6e 72 75 f9 0e |.-2..D...Tqnru..|"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa8 Verify: sig = 00000000 30 44 02 20 46 31 55 8d 63 df 95 3b 73 ea e6 e6 |0D. F1U.c..;s...|
orderer0.example.com | 00000010 8e f7 f4 c7 b0 38 55 9a c5 b1 19 e4 37 74 fd 85 |.....8U.....7t..|
orderer0.example.com | 00000020 42 56 b8 41 02 20 6d e1 44 36 55 f6 7e 64 64 b3 |BV.A. m.D6U.~dd.|
orderer0.example.com | 00000030 47 b9 5c d3 2c 28 10 03 72 b3 fd 98 f5 6b 89 6d |G.\.,(..r....k.m|
orderer0.example.com | 00000040 44 1a 60 99 cb bb |D.`...|"
orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000f15130 principal evaluation succeeds for identity 0"
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f3 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f4 0xc00312cd00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 16f5 0xc00312cd00 gate 1556789256292456700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f8 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fd Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fe Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1700 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1701 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 1702 0xc0034e24d0 gate 1556789256293934400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1703 0xc0034e24d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1704 0xc0034e24d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1705 0xc0034e24d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1706 0xc0034e24d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 1707 0xc0034e24d0 gate 1556789256293934400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1708 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 170a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 170b 0xc0034e2d10 gate 1556789256294459000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170c 0xc0034e2d10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170d 0xc0034e2d10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170e 0xc0034e2d10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 170f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 1710 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1711 0xc0034e2d10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [cauthdsl] func1 -> DEBU 1712 0xc0034e2d10 gate 1556789256294459000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
orderer0.example.com | "2019-05-02 09:28:09.874 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000f15130 gate 1556789289872980200 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.875 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: testchainid] Received seekInfo (0xc0011ac200) start:<newest:<> > stop:<newest:<> > from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.875 UTC [fsblkstorage] Next -> DEBU 1ab2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:28:09.875 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ab3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab4 Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab5 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab6 blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab7 [channel: testchainid] Delivering block [1] for (0xc0011ac200) for 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab8 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac200)"
orderer0.example.com | "2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1ab9 Waiting for new SeekInfo from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1aba Attempting to read seek info message from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func1 -> DEBU 1ac0 0xc000ccf160 gate 1556789289880360100 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc000ccf160 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc000ccf160 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc000ccf160 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:09.880 UTC [msp.identity] Verify -> DEBU 1ac4 Verify: digest = 00000000 8d ec 9c 50 23 08 9b f0 51 12 80 5b 56 8b 9e a0 |...P#...Q..[V...|
orderer0.example.com | 00000010 2e 5b 50 90 9d f9 ba ec 6c 75 80 fa 7d 9b 6a de |.[P.....lu..}.j.|"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [msp.identity] Verify -> DEBU 1ac5 Verify: sig = 00000000 30 45 02 21 00 f9 d7 37 4d 2a 21 b3 38 16 ec 7b |0E.!...7M*!.8..{|
orderer0.example.com | 00000010 39 c0 9d bb 29 79 e1 a0 9d 60 16 65 52 b0 15 f3 |9...)y...`.eR...|
orderer0.example.com | 00000020 a9 53 2e f7 3f 02 20 0c 55 b1 25 74 17 0d b5 88 |.S..?. .U.%t....|
orderer0.example.com | 00000030 64 39 b8 26 0d 2e f8 7f 28 26 01 d5 47 1e 3e 02 |d9.&....(&..G.>.|
orderer0.example.com | 00000040 2e f9 ba c4 42 25 e0 |....B%.|"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc000ccf160 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc000ccf160 gate 1556789289880360100 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1aca Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acc Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.882 UTC [policies] Evaluate -> DEBU 1acd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:09.882 UTC [common.deliver] deliverBlocks -> DEBU 1ace [channel: testchainid] Received seekInfo (0xc0011ac5c0) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] Next -> DEBU 1acf Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad1 Remaining bytes=[44241], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad2 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad3 blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad4 [channel: testchainid] Delivering block [0] for (0xc0011ac5c0) for 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad5 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac5c0)"
orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad6 Waiting for new SeekInfo from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad7 Attempting to read seek info message from 172.18.0.8:57438"
orderer0.example.com | "2019-05-02 09:28:09.894 UTC [common.deliver] Handle -> WARN 1ad8 Error reading from 172.18.0.8:57438: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:09.895 UTC [grpc] infof -> DEBU 1ad9 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:09.895 UTC [orderer.common.server] func1 -> DEBU 1ada Closing Deliver stream"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1715 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1717 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..|
peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1718 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v|
peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E|
peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p|
peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.|
peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1719 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 171a Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1720 0xc0020fab30 gate 1556789256296272400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1721 0xc0020fab30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1722 0xc0020fab30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1723 0xc0020fab30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1724 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1725 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1726 0xc0020fab30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1727 0xc0020fab30 gate 1556789256296272400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.comm] sendToEndpoint -> DEBU 16dc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 1729 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 172a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.299 UTC [gossip.comm] Send -> DEBU 172b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [msp] DeserializeIdentity -> DEBU 1731 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 172d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1730 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [policies] Evaluate -> DEBU 1732 Signature set satisfies policy /Channel/Application/Readers"
orderer0.example.com | "2019-05-02 09:28:09.900 UTC [comm.grpc.server] 1 -> INFO 1adb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57438 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.7763ms
orderer0.example.com | "2019-05-02 09:28:09.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adc Sending msg of 28 bytes to 2 on channel businesschannel took 92µs"
orderer0.example.com | "2019-05-02 09:28:09.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1add Sending msg of 28 bytes to 3 on channel businesschannel took 76.9µs"
orderer0.example.com | "2019-05-02 09:28:09.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ade Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.2µs "
orderer0.example.com | "2019-05-02 09:28:09.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 902.9µs "
orderer0.example.com | "2019-05-02 09:28:09.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:09.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.044 UTC [orderer.common.server] Deliver -> DEBU 1ae2 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae3 Starting new deliver loop for 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae4 Attempting to read seek info message from 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:10.046 UTC [policies] Evaluate -> DEBU 1ae9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func1 -> DEBU 1aea 0xc000f2ffc0 gate 1556789290046501800 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aeb 0xc000f2ffc0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aec 0xc000f2ffc0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aed 0xc000f2ffc0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aee Verify: digest = 00000000 e4 ef 83 3b 15 d5 45 77 3f 26 5c 0f 96 19 15 9b |...;..Ew?&\.....|
orderer0.example.com | 00000010 8b dc 6f 9c d4 94 9e 84 c7 f3 03 90 e6 89 d4 dc |..o.............|"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aef Verify: sig = 00000000 30 45 02 21 00 d9 99 41 8c dd 9a c5 86 23 a4 08 |0E.!...A.....#..|
orderer0.example.com | 00000010 98 85 ac 57 73 40 19 07 41 a9 e0 b3 46 b1 6a 39 |...Ws@..A...F.j9|
orderer0.example.com | 00000020 b5 0b ba b8 f0 02 20 72 ae e0 76 60 30 ce eb 85 |...... r..v`0...|
orderer0.example.com | 00000030 bd ec 9c 80 3f 9d 5b c5 86 3f d6 65 63 57 1b af |....?.[..?.ecW..|
orderer0.example.com | 00000040 31 b4 8d e7 37 31 89 |1...71.|"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [cauthdsl] func2 -> DEBU 1af0 0xc000f2ffc0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [cauthdsl] func1 -> DEBU 1af1 0xc000f2ffc0 gate 1556789290046501800 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af4 Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af6 Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [policies] Evaluate -> DEBU 1af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1af8 [channel: testchainid] Received seekInfo (0xc0003fdc40) start:<specified:<> > stop:<specified:<> > from 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] Next -> DEBU 1af9 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] newBlockfileStream -> DEBU 1afa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afb Remaining bytes=[44241], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afc Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afd blockbytes [18412] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1afe [channel: testchainid] Delivering block [0] for (0xc0003fdc40) for 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] deliverBlocks -> DEBU 1aff [channel: testchainid] Done delivering to 172.18.0.8:57440 for (0xc0003fdc40)"
orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b00 Waiting for new SeekInfo from 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b01 Attempting to read seek info message from 172.18.0.8:57440"
orderer0.example.com | "2019-05-02 09:28:10.057 UTC [grpc] infof -> DEBU 1b02 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:10.058 UTC [common.deliver] Handle -> WARN 1b03 Error reading from 172.18.0.8:57440: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:10.058 UTC [orderer.common.server] func1 -> DEBU 1b04 Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:10.059 UTC [comm.grpc.server] 1 -> INFO 1b05 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57440 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.1157ms
orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b07 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs"
peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [policies] Evaluate -> DEBU 1736 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.gossip] handleMessage -> DEBU 1737 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [gossip.gossip] handleMessage -> DEBU 1738 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 1739 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1734 Exiting"
orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.3µs "
orderer0.example.com | "2019-05-02 09:28:10.246 UTC [orderer.common.server] Deliver -> DEBU 1b09 Starting new Deliver handler"
orderer0.example.com | "2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0a Starting new deliver loop for 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0b Attempting to read seek info message from 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b10 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers =="
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func1 -> DEBU 1b11 0xc000b246b0 gate 1556789290248617400 evaluation starts"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b12 0xc000b246b0 signed by 0 principal evaluation starts (used [false])"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b13 0xc000b246b0 processing identity 0 with bytes of efef60"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b14 0xc000b246b0 principal matched by identity 0"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b15 Verify: digest = 00000000 de d8 29 3b 93 53 04 5e 60 d9 ac 8a 09 e5 a1 1d |..);.S.^`.......|
orderer0.example.com | 00000010 07 34 ab f6 9e de e1 44 12 9a 8b bf 30 0b 80 28 |.4.....D....0..(|"
orderer0.example.com | "2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b16 Verify: sig = 00000000 30 44 02 20 38 21 02 ad 0e cf 99 02 73 d0 6b f5 |0D. 8!......s.k.|
orderer0.example.com | 00000010 30 b0 2a bc 27 17 19 7a 83 b1 6f da 66 b2 3a 31 |0.*.'..z..o.f.:1|
orderer0.example.com | 00000020 e9 f2 78 8d 02 20 0f f2 c2 b6 ad a9 f6 50 db dc |..x.. .......P..|
orderer0.example.com | 00000030 88 2b 74 6f 41 a8 04 d3 5b 3c 1e d0 f8 95 f8 74 |.+toA...[<.....t|
orderer0.example.com | 00000040 f1 f1 9d cf 4a 82 |....J.|"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [cauthdsl] func2 -> DEBU 1b17 0xc000b246b0 principal evaluation succeeds for identity 0"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [cauthdsl] func1 -> DEBU 1b18 0xc000b246b0 gate 1556789290248617400 evaluation succeeds"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b19 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1b Signature set satisfies policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1d Signature set satisfies policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [common.deliver] deliverBlocks -> DEBU 1b1f [channel: testchainid] Received seekInfo (0xc0000c10c0) start:<specified:<number:1 > > stop:<specified:<number:1 > > from 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] Next -> DEBU 1b20 Initializing block stream for iterator. itr.maxBlockNumAvailable=1"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b21 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b22 Remaining bytes=[25826], Going to peek [8] bytes"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b23 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}"
orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b24 blockbytes [25823] read from file [0]"
orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b25 [channel: testchainid] Delivering block [1] for (0xc0000c10c0) for 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b26 [channel: testchainid] Done delivering to 172.18.0.8:57442 for (0xc0000c10c0)"
orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b27 Waiting for new SeekInfo from 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b28 Attempting to read seek info message from 172.18.0.8:57442"
orderer0.example.com | "2019-05-02 09:28:10.263 UTC [common.deliver] Handle -> WARN 1b29 Error reading from 172.18.0.8:57442: rpc error: code = Canceled desc = context canceled"
orderer0.example.com | "2019-05-02 09:28:10.263 UTC [orderer.common.server] func1 -> DEBU 1b2a Closing Deliver stream"
orderer0.example.com | "2019-05-02 09:28:10.263 UTC [comm.grpc.server] 1 -> INFO 1b2b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57442 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.7119ms
orderer0.example.com | "2019-05-02 09:28:10.263 UTC [grpc] infof -> DEBU 1b2c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2d Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs"
orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2e Sending msg of 28 bytes to 3 on channel businesschannel took 53.8µs"
orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs "
orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.2µs "
orderer0.example.com | "2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b32 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b31 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b33 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b34 Sending msg of 28 bytes to 3 on channel testchainid took 123.8µs"
orderer0.example.com | "2019-05-02 09:28:10.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs "
peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1735 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 173a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 173b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func1 -> DEBU 1741 0xc0023023d0 gate 1556789256305011400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1742 0xc0023023d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1743 0xc0023023d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1744 0xc0023023d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1733 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1745 0xc0023023d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.308 UTC [cauthdsl] func1 -> DEBU 1746 0xc0023023d0 gate 1556789256305011400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.308 UTC [policies] Evaluate -> DEBU 1747 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1749 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [cauthdsl] func1 -> DEBU 174a 0xc002302c10 gate 1556789256309947000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174b 0xc002302c10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174c 0xc002302c10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.311 UTC [cauthdsl] func2 -> DEBU 174d 0xc002302c10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.311 UTC [msp.identity] Verify -> DEBU 174e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [msp.identity] Verify -> DEBU 174f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [cauthdsl] func2 -> DEBU 1750 0xc002302c10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [cauthdsl] func1 -> DEBU 1751 0xc002302c10 gate 1556789256309947000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1752 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1753 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1754 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [policies] Evaluate -> DEBU 1755 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1756 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..|
peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|"
peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1757 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v|
peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E|
peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p|
peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.|
peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|"
peer0.org1.example.com | "2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1758 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1759 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 175c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func1 -> DEBU 1762 0xc002319220 gate 1556789256319227300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1763 0xc002319220 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1764 0xc002319220 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1765 0xc002319220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1766 0xc002319220 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 1767 0xc002319220 gate 1556789256319227300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 176b 0xc002319a60 gate 1556789256320657400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176c 0xc002319a60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176d 0xc002319a60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176e 0xc002319a60 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 176f Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 1770 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [cauthdsl] func2 -> DEBU 1771 0xc002319a60 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [cauthdsl] func1 -> DEBU 1772 0xc002319a60 gate 1556789256320657400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1773 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1774 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1775 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.322 UTC [policies] Evaluate -> DEBU 1776 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1777 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1778 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b36 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs"
orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b37 Sending msg of 28 bytes to 3 on channel businesschannel took 60.5µs"
orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs "
orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs "
orderer0.example.com | "2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3d Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs"
orderer0.example.com | "2019-05-02 09:28:11.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.4µs "
orderer0.example.com | "2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs"
orderer0.example.com | "2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b40 Sending msg of 28 bytes to 3 on channel businesschannel took 8µs"
orderer0.example.com | "2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs "
orderer0.example.com | "2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.7µs "
orderer0.example.com | "2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b44 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b45 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b46 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs"
orderer0.example.com | "2019-05-02 09:28:11.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs "
orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs"
orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b49 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs"
orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs "
orderer0.example.com | "2019-05-02 09:28:11.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.4µs "
orderer0.example.com | "2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4f Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs"
orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs "
orderer0.example.com | "2019-05-02 09:28:12.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b51 Sending msg of 28 bytes to 2 on channel businesschannel took 58µs"
orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b52 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs"
orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs "
orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224µs "
orderer0.example.com | "2019-05-02 09:28:12.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b55 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b56 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b57 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b58 Sending msg of 28 bytes to 3 on channel testchainid took 90.8µs"
orderer0.example.com | "2019-05-02 09:28:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs "
orderer0.example.com | "2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5a Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs"
orderer0.example.com | "2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5b Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs"
orderer0.example.com | "2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs "
orderer0.example.com | "2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs "
orderer0.example.com | "2019-05-02 09:28:12.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:12.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b60 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b61 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs"
orderer0.example.com | "2019-05-02 09:28:13.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b62 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs "
orderer0.example.com | "2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b63 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs"
orderer0.example.com | "2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b64 Sending msg of 28 bytes to 3 on channel businesschannel took 28µs"
orderer0.example.com | "2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs "
orderer0.example.com | "2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95µs "
orderer0.example.com | "2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b67 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b68 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b69 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6a Sending msg of 28 bytes to 3 on channel testchainid took 134.8µs"
orderer0.example.com | "2019-05-02 09:28:13.646 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1925ms "
orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6c Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs"
orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs"
orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.9µs "
orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs "
orderer0.example.com | "2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b71 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b72 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b73 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs"
orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.4µs "
orderer0.example.com | "2019-05-02 09:28:15.250 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b75 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs"
orderer0.example.com | "2019-05-02 09:28:15.251 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b78 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs"
orderer0.example.com | "2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b77 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs "
orderer0.example.com | "2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs "
orderer0.example.com | "2019-05-02 09:28:15.254 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7b Sending msg of 28 bytes to 3 on channel testchainid took 448µs"
orderer0.example.com | "2019-05-02 09:28:15.255 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs "
orderer0.example.com | "2019-05-02 09:28:15.256 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7e Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs"
orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7f Sending msg of 28 bytes to 2 on channel businesschannel took 9.5µs"
orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.6µs "
orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs "
orderer0.example.com | "2019-05-02 09:28:15.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b82 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b84 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b85 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs"
orderer0.example.com | "2019-05-02 09:28:15.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs "
orderer0.example.com | "2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b87 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs"
orderer0.example.com | "2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b88 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs"
orderer0.example.com | "2019-05-02 09:28:15.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.8µs "
orderer0.example.com | "2019-05-02 09:28:15.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174µs "
orderer0.example.com | "2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8e Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs"
orderer0.example.com | "2019-05-02 09:28:16.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.3µs "
orderer0.example.com | "2019-05-02 09:28:16.255 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1b90 No inactive chains to try to replicate"
orderer0.example.com | "2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b91 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs"
orderer0.example.com | "2019-05-02 09:28:16.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.5µs "
orderer0.example.com | "2019-05-02 09:28:16.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.5µs "
orderer0.example.com | "2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b94 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs"
orderer0.example.com | "2019-05-02 09:28:16.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b95 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b96 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b97 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 3 on channel testchainid took 110.8µs"
orderer0.example.com | "2019-05-02 09:28:16.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 596.5µs "
orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs"
orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9b Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs"
orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs "
orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.5µs "
orderer0.example.com | "2019-05-02 09:28:16.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:16.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:17.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:17.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba1 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs"
orderer0.example.com | "2019-05-02 09:28:17.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs "
orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba3 Sending msg of 28 bytes to 3 on channel businesschannel took 38.4µs"
orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs"
orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.6µs "
orderer0.example.com | "2019-05-02 09:28:17.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs "
orderer0.example.com | "2019-05-02 09:28:17.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 1779 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 177c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func1 -> DEBU 1782 0xc002399570 gate 1556789256326307000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1783 0xc002399570 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1784 0xc002399570 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1785 0xc002399570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1786 0xc002399570 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1787 0xc002399570 gate 1556789256326307000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1788 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1789 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 178a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 178b 0xc002399db0 gate 1556789256327282300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178c 0xc002399db0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178d 0xc002399db0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178e 0xc002399db0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 178f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1790 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1791 0xc002399db0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1792 0xc002399db0 gate 1556789256327282300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1793 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1794 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1795 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1797 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..|
peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp.identity] Verify -> DEBU 1798 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v|
peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E|
peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p|
peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.|
peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 1799 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 179a Obtaining identity"
orderer0.example.com | "2019-05-02 09:28:17.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:17.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:17.648 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1baa Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs"
orderer0.example.com | "2019-05-02 09:28:17.649 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.4µs "
orderer0.example.com | "2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bac Sending msg of 28 bytes to 2 on channel businesschannel took 85.4µs"
orderer0.example.com | "2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bad Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs"
orderer0.example.com | "2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.8µs "
orderer0.example.com | "2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 387.1µs "
orderer0.example.com | "2019-05-02 09:28:17.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:17.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs"
orderer0.example.com | "2019-05-02 09:28:18.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174µs "
orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs"
orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs"
orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.3µs "
orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.8µs "
orderer0.example.com | "2019-05-02 09:28:18.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bba Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbc Sending msg of 28 bytes to 3 on channel testchainid took 17µs"
orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs "
orderer0.example.com | "2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbe Sending msg of 28 bytes to 2 on channel businesschannel took 34µs"
orderer0.example.com | "2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbf Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs"
orderer0.example.com | "2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195µs "
orderer0.example.com | "2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.9µs "
orderer0.example.com | "2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc5 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs"
orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs "
orderer0.example.com | "2019-05-02 09:28:19.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs"
orderer0.example.com | "2019-05-02 09:28:19.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc8 Sending msg of 28 bytes to 3 on channel businesschannel took 168.2µs"
orderer0.example.com | "2019-05-02 09:28:19.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.3µs "
orderer0.example.com | "2019-05-02 09:28:19.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 409.5µs "
orderer0.example.com | "2019-05-02 09:28:19.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs"
orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs "
orderer0.example.com | "2019-05-02 09:28:19.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.1µs "
orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd1 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs"
orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd2 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs"
orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs "
orderer0.example.com | "2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.147 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd7 Sending msg of 28 bytes to 3 on channel testchainid took 98.3µs"
orderer0.example.com | "2019-05-02 09:28:20.148 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 428µs "
orderer0.example.com | "2019-05-02 09:28:20.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.8µs"
orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bda Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs"
orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs "
orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 480µs "
orderer0.example.com | "2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdd Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bde Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be0 Sending msg of 28 bytes to 3 on channel testchainid took 49.1µs"
orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs "
orderer0.example.com | "2019-05-02 09:28:20.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be2 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs"
orderer0.example.com | "2019-05-02 09:28:20.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs"
orderer0.example.com | "2019-05-02 09:28:20.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs "
orderer0.example.com | "2019-05-02 09:28:20.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.5µs "
orderer0.example.com | "2019-05-02 09:28:20.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:20.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.146 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be9 Sending msg of 28 bytes to 3 on channel testchainid took 41.6µs"
orderer0.example.com | "2019-05-02 09:28:21.147 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.4µs "
orderer0.example.com | "2019-05-02 09:28:21.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1beb Sending msg of 28 bytes to 2 on channel businesschannel took 37.3µs"
orderer0.example.com | "2019-05-02 09:28:21.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bed Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs"
orderer0.example.com | "2019-05-02 09:28:21.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 431.8µs "
orderer0.example.com | "2019-05-02 09:28:21.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs "
orderer0.example.com | "2019-05-02 09:28:21.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bef Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf2 Sending msg of 28 bytes to 3 on channel testchainid took 288.7µs"
orderer0.example.com | "2019-05-02 09:28:21.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.7µs "
orderer0.example.com | "2019-05-02 09:28:21.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 37µs"
orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf5 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs"
orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs "
orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.1µs "
orderer0.example.com | "2019-05-02 09:28:21.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:21.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:22.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28"
orderer0.example.com | "2019-05-02 09:28:22.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfb Sending msg of 28 bytes to 3 on channel testchainid took 239.6µs"
orderer0.example.com | "2019-05-02 09:28:22.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.8µs "
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 179b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 17a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.330 UTC [cauthdsl] func1 -> DEBU 17a1 0xc0023ddca0 gate 1556789256330252300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.330 UTC [cauthdsl] func2 -> DEBU 17a2 0xc0023ddca0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a3 0xc0023ddca0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a4 0xc0023ddca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [cauthdsl] func2 -> DEBU 17a5 0xc0023ddca0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [cauthdsl] func1 -> DEBU 17a6 0xc0023ddca0 gate 1556789256330252300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [policies] Evaluate -> DEBU 17a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func1 -> DEBU 17aa 0xc0024364e0 gate 1556789256333837100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ab 0xc0024364e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ac 0xc0024364e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17ad 0xc0024364e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17ae Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.|
peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17af Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8|
peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...|
peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.|
peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....|
peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17b0 0xc0024364e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func1 -> DEBU 17b1 0xc0024364e0 gate 1556789256333837100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b4 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b6 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b7 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:36.336 UTC [gossip.gossip] handleMessage -> DEBU 17b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17b9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17bc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.554 UTC [gossip.gossip] handleMessage -> DEBU 17bd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789252680836200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17be Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17bf Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:36.556 UTC [gossip.gossip] handleMessage -> DEBU 17c0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.576 UTC [gossip.gossip] handleMessage -> DEBU 17c1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7644257686890927938 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.pull] HandleMessage -> DEBU 17c2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7644257686890927938 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.pull] SendDigest -> DEBU 17c3 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.gossip] handleMessage -> DEBU 17c4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17ca Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17cb Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17ce == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func1 -> DEBU 17cf 0xc0035cb1e0 gate 1556789256821036100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d0 0xc0035cb1e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d1 0xc0035cb1e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d2 0xc0035cb1e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d3 Verify: digest = 00000000 1b 69 39 fb e0 70 73 f1 5b e0 96 30 08 b2 8d 0e |.i9..ps.[..0....|
peer0.org1.example.com | 00000010 59 cb 9c d4 09 22 a8 98 cc 9b 80 40 78 30 5d 43 |Y....".....@x0]C|"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d4 Verify: sig = 00000000 30 45 02 21 00 be 35 cb e4 db 2e 15 46 6b c8 12 |0E.!..5.....Fk..|
peer0.org1.example.com | 00000010 05 38 7c a4 fe 7c f8 24 de e6 20 f5 96 a7 a6 60 |.8|..|.$.. ....`|
peer0.org1.example.com | 00000020 2e 80 d2 03 34 02 20 19 43 c1 a8 6a bc 19 32 8a |....4. .C..j..2.|
peer0.org1.example.com | 00000030 6b fe a8 41 71 43 cd 2b 8a e9 d4 42 36 01 cc 76 |k..AqC.+...B6..v|
peer0.org1.example.com | 00000040 7b 80 5a a9 96 13 2c |{.Z...,|"
peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d5 0xc0035cb1e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [cauthdsl] func1 -> DEBU 17d6 0xc0035cb1e0 gate 1556789256821036100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d9 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17db [businesschannel] Adding payload to local buffer, blockNum = [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dc [businesschannel] Adding payload to local buffer, blockNum = [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dd Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17de [businesschannel] Gossiping block [5], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.channel] AddToMsgStore -> DEBU 17df Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.pull] Add -> DEBU 17e0 Added 5, total items: 5"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e2 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> INFO 17e3 [businesschannel] Received block [5] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> DEBU 17e4 [businesschannel] Validating block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e5 [businesschannel] START Block Validation for block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e6 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] validateTx -> DEBU 17e7 [businesschannel] validateTx starts for block 0xc0033afec0 env 0xc003709f90 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e8 ValidateTransactionEnvelope starts for envelope 0xc003709f90"
peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e9 Header is channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" "
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] validateChannelHeader -> DEBU 17ea validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17eb begin"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp] GetManagerForChain -> DEBU 17ec Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ed creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ee creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17ef Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.|
peer0.org1.example.com | 00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|"
peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17f0 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a|
peer0.org1.example.com | 00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)|
peer0.org1.example.com | 00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......|
peer0.org1.example.com | 00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2|
peer0.org1.example.com | 00000040 e6 e4 37 e8 a5 f7 |..7...|"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] checkSignatureFromCreator -> DEBU 17f1 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f2 validateEndorserTransaction starts for data 0xc0035d5000, header channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" "
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f3 validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f4 validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] ValidateTransaction -> DEBU 17f5 ValidateTransactionEnvelope returns err %!s(<nil>)"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f6 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 17f7 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f8 Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] Dispatch -> DEBU 17f9 [businesschannel] Dispatch starts for bytes 0xc0035d7300"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fa constructing new query executor txid = [c1fca0ee-90d2-4a85-b1f6-f4279e627420]"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fb Done with transaction simulation / query execution [c1fca0ee-90d2-4a85-b1f6-f4279e627420]"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 17fc Validating Tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fd constructing new query executor txid = [46d5b075-b956-4fa0-bab6-93512eab1493]"
peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fe Done with transaction simulation / query execution [46d5b075-b956-4fa0-bab6-93512eab1493]"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement =="
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1800 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement =="
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func1 -> DEBU 1802 0xc00276a1a0 gate 1556789256826232100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1803 0xc00276a1a0 signed by 0 principal evaluation starts (used [false false])"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1804 0xc00276a1a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1805 0xc00276a1a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1806 Verify: digest = 00000000 64 e4 b5 31 8b fe 55 90 73 8a 94 89 ae ec f0 b0 |d..1..U.s.......|
peer0.org1.example.com | 00000010 8e de 71 f5 92 07 1b e9 75 06 92 71 fb 06 87 e1 |..q.....u..q....|"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1807 Verify: sig = 00000000 30 44 02 20 6e fd 30 46 b1 7d 4d d2 77 78 2c 7e |0D. n.0F.}M.wx,~|
peer0.org1.example.com | 00000010 ce 44 f3 a7 bb 07 35 51 a9 a6 95 ff db 45 e3 57 |.D....5Q.....E.W|
peer0.org1.example.com | 00000020 e0 d1 d2 59 02 20 4e b0 9f 48 c7 10 e7 38 92 e5 |...Y. N..H...8..|
peer0.org1.example.com | 00000030 76 4c ba e6 cd e1 b0 5d 91 7b c7 92 60 c9 30 44 |vL.....].{..`.0D|
peer0.org1.example.com | 00000040 83 6d 43 57 30 df |.mCW0.|"
peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1808 0xc00276a1a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 1809 0xc00276a1a0 gate 1556789256826232100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement =="
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 180d 0xc00276ade0 gate 1556789256827589900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180e 0xc00276ade0 signed by 0 principal evaluation starts (used [false false])"
peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180f 0xc00276ade0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1810 0xc00276ade0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1811 0xc00276ade0 processing identity 1 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1812 0xc00276ade0 principal matched by identity 1"
peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1813 Verify: digest = 00000000 63 0f 94 61 5c cf 70 eb ab 79 52 8b 39 ce b3 ea |c..a\.p..yR.9...|
peer0.org1.example.com | 00000010 87 1c 67 50 e8 02 a2 a3 64 4b 7e 76 a8 57 ea f9 |..gP....dK~v.W..|"
peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1814 Verify: sig = 00000000 30 44 02 20 49 e8 bd 2a 99 34 6e 1a 70 a1 4d 63 |0D. I..*.4n.p.Mc|
peer0.org1.example.com | 00000010 71 7c f3 48 dd c9 09 c7 7a a6 c8 30 80 7e 26 e2 |q|.H....z..0.~&.|
peer0.org1.example.com | 00000020 d2 ef 2a 9a 02 20 21 0c 81 fa a1 82 1d 69 6e cf |..*.. !......in.|
peer0.org1.example.com | 00000030 63 6e a0 4c b3 13 14 12 1c bf 7c 5f 63 1e 38 ac |cn.L......|_c.8.|
peer0.org1.example.com | 00000040 cb 55 b5 4e 37 eb |.U.N7.|"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [cauthdsl] func2 -> DEBU 1815 0xc00276ade0 principal evaluation succeeds for identity 1"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [cauthdsl] func1 -> DEBU 1816 0xc00276ade0 gate 1556789256827589900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1817 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1819 Signature set satisfies policy /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 181a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181b constructing new query executor txid = [8a948209-c29a-46fa-8cbb-4f01770a2ddb]"
peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] Done -> DEBU 181c Done with transaction simulation / query execution [8a948209-c29a-46fa-8cbb-4f01770a2ddb]"
peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181d constructing new query executor txid = [bf4839c9-b45c-4566-91e3-00afba3760eb]"
peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] Done -> DEBU 181e Done with transaction simulation / query execution [bf4839c9-b45c-4566-91e3-00afba3760eb]"
peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 1820 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1821 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1822 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] Send -> DEBU 1823 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1824 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1825 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1826 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1827 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1828 constructing new query executor txid = [69339387-8be9-4cd8-a4bd-d90910597306]"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 1829 Done with transaction simulation / query execution [69339387-8be9-4cd8-a4bd-d90910597306]"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 182a constructing new query executor txid = [61ed8755-2925-49e1-90c1-3ea340992ac9]"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 182b Done with transaction simulation / query execution [61ed8755-2925-49e1-90c1-3ea340992ac9]"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [vscc] Validate -> DEBU 182c block 5, namespace: _lifecycle, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 182d Transaction f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Dispatch -> DEBU 182e [businesschannel] Dispatch completes env bytes 0xc0035d7300"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] validateTx -> DEBU 182f [businesschannel] validateTx completes for block 0xc0033afec0 env 0xc003709f90 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> DEBU 1830 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> INFO 1831 [businesschannel] Validated block [5] in 9ms"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1832 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1833 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1834 Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] StoreBlock -> DEBU 1835 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [kvledger] CommitWithPvtData -> DEBU 1836 [businesschannel] Validating state for block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1837 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1838 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1839 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183a ValidateAndPrepareBatch() for block number = [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183b preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] preprocessProtoBlock -> DEBU 183c txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 183e Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183f GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 1840 Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1841 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1842 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1843 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1844 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1845 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1846 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1847 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1848 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1849 Block [5] Transaction index [0] TxId [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] marked as valid by state validator. ContainsPostOrderWrites [false]"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valinternal] ApplyWriteSet -> DEBU 184a txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003503a40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003503a80), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003503ac0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003503b40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003503b80)}"
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184b validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184c postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184d ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 184e Updating cached definition for chaincode 'exp02' on channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 184f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1850 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1851 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1852 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1853 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'"
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>"org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1854 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D> <09><0F>=<3D>Y\<03><>}<7D>J=<3D>M#d<>
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 1855 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0"
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>:exp02 <20><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ:exp02 <20><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>:exp02]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>,O<><4F>z<0E><><EFBFBD>q<EFBFBD>{<7B><>:<3A>1oS'<27>w? <0B><><EFBFBD>j<EFBFBD><6A>:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[businesschannel:map[exp02:0xc00326b290]]})]}"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleStateUpdates -> DEBU 1857 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003262f00), (*kvrwset.KVWrite)(0xc003262f50), (*kvrwset.KVWrite)(0xc003262fa0), (*kvrwset.KVWrite)(0xc003262ff0), (*kvrwset.KVWrite)(0xc003263040)}}"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleStateUpdates -> INFO 1858 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 1859 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 185a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 185b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185c Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185e GetState(). ns=lscc, key=exp02"
peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185f Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}"
peer0.org1.example.com | "2019-05-02 09:27:36.835 UTC [confighistory] add -> DEBU 1860 add() - {lscc, exp02~collection, 5}"
peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1861 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}"
peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [kvledger] CommitWithPvtData -> DEBU 1862 [businesschannel] Committing block [5] to storage"
peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1863 Writing block [5] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:36.839 UTC [pvtdatastorage] Prepare -> DEBU 1864 Saved 0 private data write sets for block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1865 Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets=
peer0.org1.example.com | txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1866 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1867 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx number:[0] ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:36.844 UTC [fsblkstorage] updateCheckpoint -> DEBU 1868 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86507], isChainEmpty=[false], lastBlockNumber=[5]"
peer0.org1.example.com | "2019-05-02 09:27:36.845 UTC [pvtdatastorage] Commit -> DEBU 1869 Committing private data for block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.846 UTC [pvtdatastorage] Commit -> DEBU 186a Committed private data for block [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [kvledger] CommitWithPvtData -> DEBU 186b [businesschannel] Committing block [5] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186c lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186d Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 186e Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [lockbasedtxmgr] Commit -> DEBU 186f Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1870 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]"
peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1871 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1872 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1873 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1874 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.comm] func1 -> DEBU 1875 Got message: GossipMessage: tag:EMPTY hello:<nonce:14733539804223156707 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.gossip] handleMessage -> DEBU 1876 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14733539804223156707 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.pull] HandleMessage -> DEBU 1877 GossipMessage: tag:EMPTY hello:<nonce:14733539804223156707 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1878 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1879 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [gossip.pull] SendDigest -> DEBU 187e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [gossip.gossip] handleMessage -> DEBU 187f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.851 UTC [fsblkstorage] waitForBlock -> DEBU 1880 Came out of wait. maxAvailaBlockNumber=[5]"
peer0.org1.example.com | "2019-05-02 09:27:36.851 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1881 Remaining bytes=[5713], Going to peek [8] bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1882 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80794], bytesOffset=[80796]}"
peer0.org1.example.com | "2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1883 blockbytes [5711] read from file [0]"
peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] Commit -> DEBU 1884 Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1885 Preparing potential purge list working-set for expiringAtBlk [6]"
peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] func1 -> DEBU 1886 launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [kvledger] CommitWithPvtData -> DEBU 1887 [businesschannel] Committing block [5] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [historyleveldb] Commit -> DEBU 1888 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [leveldbhelper] GetIterator -> DEBU 1889 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:36.857 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 188a No expiry entry found for expiringAtBlk [6]"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.comm] func1 -> DEBU 188b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 188f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [msp] DeserializeIdentity -> DEBU 1890 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1891 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1892 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1893 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1896 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [cauthdsl] func1 -> DEBU 1897 0xc002f8ce80 gate 1556789256859974400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1898 0xc002f8ce80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1899 0xc002f8ce80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189a 0xc002f8ce80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189b 0xc002f8ce80 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 189c 0xc002f8ce80 gate 1556789256859974400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 18a0 0xc002f8d6c0 gate 1556789256860328500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a1 0xc002f8d6c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a2 0xc002f8d6c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [historyleveldb] Commit -> DEBU 18a3 Channel [businesschannel]: Updates committed to history database for blockNo [5]"
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [kvledger] CommitWithPvtData -> INFO 18a4 [businesschannel] Committed block [5] with 1 transaction(s) in 29ms (state_validation=5ms block_commit=9ms state_commit=9ms)"
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a5 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020806 "
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a6 Sign: digest: 18C8659D2BDBC244829233FA82F12F4FE7D980E6B95C6E3F3A1E6BE496F5D8FF "
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [gossip.state] commitBlock -> DEBU 18a7 [businesschannel] Committed block [5] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [common.deliver] deliverBlocks -> DEBU 18a8 [channel: businesschannel] Delivering block [5] for (0xc0034d26c0) for 172.18.0.8:57318"
peer0.org1.example.com | "2019-05-02 09:27:36.863 UTC [fsblkstorage] waitForBlock -> DEBU 18a9 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]"
peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18aa 0xc002f8d6c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ab Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..|
peer0.org1.example.com | 00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ac Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;|
peer0.org1.example.com | 00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.|
peer0.org1.example.com | 00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%|
peer0.org1.example.com | 00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*|
peer0.org1.example.com | 00000040 6b fb cf fb ee d8 97 |k......|"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [cauthdsl] func2 -> DEBU 18ad 0xc002f8d6c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [cauthdsl] func1 -> DEBU 18ae 0xc002f8d6c0 gate 1556789256860328500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18af Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18bb Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18be Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] Send -> DEBU 18bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18c0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [common.deliver] deliverBlocks -> DEBU 18c3 Context canceled, aborting wait for next block"
peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [common.deliverevents] func1 -> DEBU 18c5 Closing Deliver stream"
peer0.org1.example.com | "2019-05-02 09:27:36.925 UTC [comm.grpc.server] 1 -> INFO 18c7 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:04.468Z grpc.peer_address=172.18.0.8:57318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4557811s
peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [grpc] infof -> DEBU 18c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [fsblkstorage] waitForBlock -> DEBU 18c6 Came out of wait. maxAvailaBlockNumber=[5]"
peer0.org1.example.com | "2019-05-02 09:27:36.932 UTC [grpc] infof -> DEBU 18c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [gossip.pull] Hello -> DEBU 18cb Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] Send -> DEBU 18ce Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11246267138444085805 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11246267138444085805 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18d0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.015 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.pull] HandleMessage -> DEBU 18d3 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.018 UTC [gossip.comm] func1 -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.comm] func1 -> DEBU 18d5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [msp] DeserializeIdentity -> DEBU 18d7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18da Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18db Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18dc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18de Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18df Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e3 0xc0020db600 gate 1556789257028015400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e4 0xc0020db600 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e5 0xc0020db600 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e6 0xc0020db600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e7 0xc0020db600 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e8 0xc0020db600 gate 1556789257028015400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18ec 0xc0020dbe40 gate 1556789257028656700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ed 0xc0020dbe40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ee 0xc0020dbe40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ef 0xc0020dbe40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f0 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f1 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [cauthdsl] func2 -> DEBU 18f2 0xc0020dbe40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [cauthdsl] func1 -> DEBU 18f3 0xc0020dbe40 gate 1556789257028656700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fa Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func1 -> DEBU 18ff 0xc0026d1020 gate 1556789257030186500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1900 0xc0026d1020 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1901 0xc0026d1020 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1902 0xc0026d1020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1903 0xc0026d1020 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [cauthdsl] func1 -> DEBU 1904 0xc0026d1020 gate 1556789257030186500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1905 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1906 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [policies] Evaluate -> DEBU 1907 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func1 -> DEBU 1908 0xc0020d2920 gate 1556789257049107800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 1909 0xc0020d2920 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190a 0xc0020d2920 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190b 0xc0020d2920 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190c Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [cauthdsl] func2 -> DEBU 190e 0xc0020d2920 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [cauthdsl] func1 -> DEBU 190f 0xc0020d2920 gate 1556789257049107800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1910 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1914 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.058 UTC [msp] DeserializeIdentity -> DEBU 1916 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1917 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1918 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1919 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func1 -> DEBU 191d 0xc0026ec260 gate 1556789257073691600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191e 0xc0026ec260 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191f 0xc0026ec260 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1920 0xc0026ec260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1921 0xc0026ec260 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1922 0xc0026ec260 gate 1556789257073691600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1923 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1925 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1926 0xc0026ecaa0 gate 1556789257074441500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1927 0xc0026ecaa0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1928 0xc0026ecaa0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1929 0xc0026ecaa0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192b Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [gossip.comm] Send -> DEBU 192e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1930 0xc0026ecaa0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [cauthdsl] func1 -> DEBU 1931 0xc0026ecaa0 gate 1556789257074441500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1932 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1935 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1936 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1939 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 193d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1941 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1943 0xc00270a920 gate 1556789257077287400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1944 0xc00270a920 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1945 0xc00270a920 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1946 0xc00270a920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1947 0xc00270a920 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1948 0xc00270a920 gate 1556789257077287400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1949 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 194c 0xc00270b160 gate 1556789257077808300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194d 0xc00270b160 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194e 0xc00270b160 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 194f 0xc00270b160 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1950 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1951 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 1952 0xc00270b160 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func1 -> DEBU 1953 0xc00270b160 gate 1556789257077808300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1954 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1955 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1956 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1957 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [gossip.gossip] handleMessage -> DEBU 1958 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [gossip.comm] sendToEndpoint -> DEBU 1959 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.079 UTC [gossip.comm] sendToEndpoint -> DEBU 195a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195c Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17288215980809784081 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195e Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14406783678540006922 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 1960 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17964909712877384058 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1961 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17964909712877384058 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1962 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1963 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151016 "
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1964 Sign: digest: EF7A3BC1C3331D871758D2E0BD699A5307DD180B35BEE6D3A2B817AF4CDE8DB7 "
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1965 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1966 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17288215980809784081 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1967 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.124 UTC [gossip.comm] sendToEndpoint -> DEBU 1968 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14406783678540006922 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1969 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 196a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.151 UTC [gossip.gossip] handleMessage -> DEBU 1976 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.pull] HandleMessage -> DEBU 1977 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1978 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 197a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 197b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 197c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S|
peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|"
peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm|
peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....|
peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;|
peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?|
peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 197f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] isSentByMe -> DEBU 1980 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 1981 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1982 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [msp] DeserializeIdentity -> DEBU 1983 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1984 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1985 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1986 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198a 0xc002cafc70 gate 1556789257153991900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198b 0xc002cafc70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198c 0xc002cafc70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198d 0xc002cafc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198e 0xc002cafc70 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198f 0xc002cafc70 gate 1556789257153991900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 1993 0xc0035ac4b0 gate 1556789257154617400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1994 0xc0035ac4b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1995 0xc0035ac4b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1996 0xc0035ac4b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1997 Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..|
peer0.org1.example.com | 00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|"
peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;|
peer0.org1.example.com | 00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.|
peer0.org1.example.com | 00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%|
peer0.org1.example.com | 00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*|
peer0.org1.example.com | 00000040 6b fb cf fb ee d8 97 |k......|"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [cauthdsl] func2 -> DEBU 1999 0xc0035ac4b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [cauthdsl] func1 -> DEBU 199a 0xc0035ac4b0 gate 1556789257154617400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 199f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 19a0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a2 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v|
peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|"
peer0.org1.example.com | "2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a3 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{||
peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......|
peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...|
peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.|
peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|"
peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.gossip] handleMessage -> DEBU 19a6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.168 UTC [gossip.pull] HandleMessage -> DEBU 19a7 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.169 UTC [gossip.gossip] handleMessage -> DEBU 19a8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.170 UTC [gossip.gossip] handleMessage -> DEBU 19a9 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 19aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.172 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ac updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 19af Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b4 Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S|
peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b5 Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm|
peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....|
peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;|
peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?|
peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] isSentByMe -> DEBU 19b7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19ba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bb Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19be Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:6343694939187841701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bf GossipMessage: tag:EMPTY hello:<nonce:6343694939187841701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] SendDigest -> DEBU 19c0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c3 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v|
peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|"
peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c4 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{||
peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......|
peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...|
peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.|
peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19c7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19cb Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v|
peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|"
peer0.org1.example.com | "2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{||
peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......|
peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...|
peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.|
peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|"
peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19ce Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19cf Verify: sig = 00000000 30 45 02 21 00 dc 48 35 01 4d 94 b3 90 84 da ab |0E.!..H5.M......|
peer0.org1.example.com | 00000010 3b 00 de 0e 9c d6 81 65 5e 5f 22 43 35 d1 17 f5 |;......e^_"C5...|
peer0.org1.example.com | 00000020 48 d6 aa ad 17 02 20 52 39 9e 4b 78 07 c5 9c e9 |H..... R9.Kx....|
peer0.org1.example.com | 00000030 98 b4 94 83 cc d3 06 8f cb 70 9b 33 69 3f 05 72 |.........p.3i?.r|
peer0.org1.example.com | 00000040 b4 41 46 6b c6 47 ca |.AFk.G.|"
peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d2 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] Send -> DEBU 19d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d6 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.182 UTC [gossip.gossip] handleMessage -> DEBU 19da Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19dc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.184 UTC [msp.identity] Verify -> DEBU 19dd Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S|
peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|"
peer0.org1.example.com | "2019-05-02 09:27:37.185 UTC [msp.identity] Verify -> DEBU 19de Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm|
peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....|
peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;|
peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?|
peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|"
peer0.org1.example.com | "2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19df Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19e0 Verify: sig = 00000000 30 44 02 20 03 ce cf 3f 7f 93 0c a1 a2 a6 0f bc |0D. ...?........|
peer0.org1.example.com | 00000010 be 27 78 ca 90 05 e8 98 88 4f 38 94 58 de ac ca |.'x......O8.X...|
peer0.org1.example.com | 00000020 3d a6 0d 08 02 20 41 e8 8b ca 4e 1a 73 69 b1 2e |=.... A...N.si..|
peer0.org1.example.com | 00000030 a1 d2 0b 22 af 45 fd 97 db 4b 45 78 85 e5 ba 5a |...".E...KEx...Z|
peer0.org1.example.com | 00000040 8d 90 d6 4a 60 28 |...J`(|"
peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] isSentByMe -> DEBU 19e2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19e4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [gossip.gossip] handleMessage -> DEBU 19e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6741898486811688121 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [gossip.pull] HandleMessage -> DEBU 19e6 GossipMessage: tag:EMPTY hello:<nonce:6741898486811688121 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [msp] DeserializeIdentity -> DEBU 19e7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19eb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [gossip.pull] SendDigest -> DEBU 19ed Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:37.207 UTC [gossip.gossip] handleMessage -> DEBU 19ee Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.211 UTC [gossip.gossip] handleMessage -> DEBU 19ef Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19f1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:37.218 UTC [msp] DeserializeIdentity -> DEBU 19f2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:37.223 UTC [policies] Evaluate -> DEBU 19f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19fa 0xc0036a0b10 gate 1556789257225985100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fb 0xc0036a0b10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fc 0xc0036a0b10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0036a0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0036a0b10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19ff 0xc0036a0b10 gate 1556789257225985100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 1a03 0xc0036a1350 gate 1556789257226546100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.227 UTC [cauthdsl] func2 -> DEBU 1a04 0xc0036a1350 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a05 0xc0036a1350 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a06 0xc0036a1350 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a07 Verify: digest = 00000000 4a 51 f9 d3 1d 86 6c cc 00 8a 03 00 8c 20 bb 03 |JQ....l...... ..|
peer0.org1.example.com | 00000010 56 fc b2 87 56 45 db 1c ea 71 fa fb 76 b6 10 bd |V...VE...q..v...|"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a08 Verify: sig = 00000000 30 45 02 21 00 be 43 3e be c0 b7 4f 20 bb 4a 35 |0E.!..C>...O .J5|
peer0.org1.example.com | 00000010 f8 12 79 0c 5b ce 3c a9 bf a4 49 73 50 b5 38 42 |..y.[.<...IsP.8B|
peer0.org1.example.com | 00000020 8f 37 f4 ce 57 02 20 5d d2 7b 94 28 e4 d1 9a aa |.7..W. ].{.(....|
peer0.org1.example.com | 00000030 1a 4d df 0a 9b e2 a8 81 e7 f6 d0 c0 4d 76 b2 0a |.M..........Mv..|
peer0.org1.example.com | 00000040 11 d2 26 c1 d6 2b 9c |..&..+.|"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a09 0xc0036a1350 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0036a1350 gate 1556789257226546100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a0f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.213 UTC [gossip.gossip] handleMessage -> DEBU 19f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.231 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a10 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a11 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a12 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 "
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a13 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a14 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a15 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] sendMemResponse -> DEBU 1a16 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a17 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a18 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a19 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.comm] Send -> DEBU 1a1a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.234 UTC [gossip.discovery] sendMemResponse -> DEBU 1a1b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a1e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [gossip.election] waitForInterrupt -> DEBU 1a1f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [gossip.election] IsLeader -> DEBU 1a20 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [msp.identity] Sign -> DEBU 1a21 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510051801 "
peer0.org1.example.com | "2019-05-02 09:27:37.343 UTC [msp.identity] Sign -> DEBU 1a22 Sign: digest: 810E30A8E997A8A9AA9C43723F5CC5F64CA5EFB1EE6590C4CC57E5051125EA97 "
peer0.org1.example.com | "2019-05-02 09:27:37.343 UTC [gossip.election] waitForInterrupt -> DEBU 1a23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a26 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a27 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [gossip.comm] Send -> DEBU 1a28 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a29 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a2a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:37.348 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:37.509 UTC [endorser] ProcessProposal -> DEBU 1a2d Entering: request from 172.18.0.8:57326"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] ValidateProposalMessage -> DEBU 1a2e ValidateProposalMessage starts for signed proposal 0xc002ca5900"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] validateChannelHeader -> DEBU 1a2f validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a30 begin"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp] GetManagerForChain -> DEBU 1a31 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a33 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a34 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...|
peer0.org1.example.com | 00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|"
peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a35 Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.|
peer0.org1.example.com | 00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...|
peer0.org1.example.com | 00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....|
peer0.org1.example.com | 00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L|
peer0.org1.example.com | 00000040 74 f2 9d 56 35 fe a7 |t..V5..|"
peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a36 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a37 validateChaincodeProposalMessage starts for proposal 0xc002f2ea80, header 0xc002ca5d10"
peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a38 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [endorser] preProcess -> DEBU 1a39 [businesschannel][2a51a49a] processing txid: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff"
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a3a retrieveTransactionByID() - txId = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]"
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a3b constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1a3c constructing new tx simulator txid = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]"
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [endorser] SimulateProposal -> DEBU 1a3d [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [endorser] callChaincode -> INFO 1a3e [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [chaincode] Execute -> DEBU 1a3f Entry"
peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a40 acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition"
peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a41 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a43 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func1 -> DEBU 1a45 0xc003222f10 gate 1556789257514105800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a46 0xc003222f10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a47 0xc003222f10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a48 0xc003222f10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a49 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...|
peer0.org1.example.com | 00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|"
peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a4a Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.|
peer0.org1.example.com | 00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...|
peer0.org1.example.com | 00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....|
peer0.org1.example.com | 00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L|
peer0.org1.example.com | 00000040 74 f2 9d 56 35 fe a7 |t..V5..|"
peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc003222f10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [cauthdsl] func1 -> DEBU 1a4c 0xc003222f10 gate 1556789257514105800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4d Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [policies] Evaluate -> DEBU 1a50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 1a51 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'"
peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [chaincode] handleMessage -> DEBU 1a52 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [chaincode] HandleTransaction -> DEBU 1a53 [2a51a49a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] HandleGetState -> DEBU 1a54 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [stateleveldb] GetState -> DEBU 1a55 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] HandleTransaction -> DEBU 1a56 [2a51a49a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] handleMessage -> DEBU 1a57 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a58 [2a51a49a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleGetState -> DEBU 1a59 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [stateleveldb] GetState -> DEBU 1a5a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5b [2a51a49a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] handleMessage -> DEBU 1a5c [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5d [2a51a49a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [chaincode] HandleGetState -> DEBU 1a5e [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [stateleveldb] GetState -> DEBU 1a5f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo"
peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [chaincode] HandleTransaction -> DEBU 1a60 [2a51a49a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] handleMessage -> DEBU 1a61 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a62 [2a51a49a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleGetState -> DEBU 1a63 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [stateleveldb] GetState -> DEBU 1a64 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo"
peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a65 [2a51a49a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] handleMessage -> DEBU 1a66 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] HandleTransaction -> DEBU 1a67 [2a51a49a] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] HandleGetState -> DEBU 1a68 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [stateleveldb] GetState -> DEBU 1a69 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections"
peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [chaincode] HandleTransaction -> DEBU 1a6a [2a51a49a] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [lifecycle] QueryChaincodeDefinition -> INFO 1a6b successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'"
peer0.org1.example.com | "2019-05-02 09:27:37.523 UTC [chaincode] handleMessage -> DEBU 1a6c [2a51a49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:37.523 UTC [chaincode] Notify -> DEBU 1a6d [2a51a49a] notifying Txid:2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [chaincode] Execute -> DEBU 1a6e Exit"
peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [endorser] callChaincode -> INFO 1a6f [businesschannel][2a51a49a] Exit chaincode: name:"_lifecycle" (12ms)"
peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1a70 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [lockbasedtxmgr] Done -> DEBU 1a71 Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]"
peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] SimulateProposal -> DEBU 1a72 [businesschannel][2a51a49a] Exit"
peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a73 [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" "
peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a74 [businesschannel][2a51a49a] escc for chaincode name:"_lifecycle" is escc"
peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [endorser] EndorseWithPlugin -> DEBU 1a75 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a76 Sign: plaintext: 0A20B348ED120D53BACF7A3C86E9718B...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a77 Sign: digest: C553EED6EE12E50E703B964FE3C4765A5066983801BEF1DB8B440E28787F0154 "
peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] EndorseWithPlugin -> DEBU 1a78 Exiting {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}"
peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] endorseProposal -> DEBU 1a79 [businesschannel][2a51a49a] Exit"
peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [lockbasedtxmgr] Done -> DEBU 1a7a Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]"
peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] func1 -> DEBU 1a7b Exit: request from 172.18.0.8:57326"
peer0.org1.example.com | "2019-05-02 09:27:37.528 UTC [comm.grpc.server] 1 -> INFO 1a7c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57326 grpc.code=OK grpc.call_duration=18.6284ms
peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] warningf -> DEBU 1a7e transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57326: read: connection reset by peer"
peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [endorser] ProcessProposal -> DEBU 1a80 Entering: request from 172.18.0.8:57334"
peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] ValidateProposalMessage -> DEBU 1a81 ValidateProposalMessage starts for signed proposal 0xc0036875e0"
peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] validateChannelHeader -> DEBU 1a82 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a83 begin"
peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [msp] GetManagerForChain -> DEBU 1a84 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a85 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a86 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.|
peer0.org1.example.com | 00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"|
peer0.org1.example.com | 00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<|
peer0.org1.example.com | 00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...|
peer0.org1.example.com | 00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....|
peer0.org1.example.com | 00000040 7f 15 3e 12 d2 13 |..>...|"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a89 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8a validateChaincodeProposalMessage starts for proposal 0xc002e6ce00, header 0xc0036879f0"
peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8b validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [endorser] preProcess -> DEBU 1a8c [businesschannel][592858be] processing txid: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9"
peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a8d retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]"
peer0.org1.example.com | "2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8e acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8f acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func1 -> DEBU 1a93 0xc00265c340 gate 1556789258278918800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a94 0xc00265c340 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a95 0xc00265c340 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a96 0xc00265c340 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a97 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.|
peer0.org1.example.com | 00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|"
peer0.org1.example.com | "2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a98 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"|
peer0.org1.example.com | 00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<|
peer0.org1.example.com | 00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...|
peer0.org1.example.com | 00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....|
peer0.org1.example.com | 00000040 7f 15 3e 12 d2 13 |..>...|"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [cauthdsl] func2 -> DEBU 1a99 0xc00265c340 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [cauthdsl] func1 -> DEBU 1a9a 0xc00265c340 gate 1556789258278918800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9b Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9d Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a9f constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1aa0 constructing new tx simulator txid = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]"
peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [endorser] SimulateProposal -> DEBU 1aa1 [businesschannel][592858be] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:38.283 UTC [stateleveldb] GetState -> DEBU 1aa2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:38.283 UTC [endorser] callChaincode -> INFO 1aa3 [businesschannel][592858be] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:38.284 UTC [stateleveldb] GetState -> DEBU 1aa4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] LaunchConfig -> DEBU 1aa5 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]"
peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa6 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b"
peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa7 start container with args: chaincode -peer.address=peer0.org1.example.com:7052"
peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa8 start container with env:
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning
peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true
peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt"
peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aa9 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock"
peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aaa got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock"
peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [dockercontroller] stopInternal -> DEBU 1aab stopping container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | "2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aac stop container result" error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b"
peer0.org1.example.com | "2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aad killing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | "2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aae kill container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b"
peer0.org1.example.com | "2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aaf removing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | "2019-05-02 09:27:38.304 UTC [dockercontroller] stopInternal -> DEBU 1ab0 remove container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error=null
peer0.org1.example.com | "2019-05-02 09:27:38.304 UTC [dockercontroller] createContainer -> DEBU 1ab1 create container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | "2019-05-02 09:27:38.442 UTC [dockercontroller] createContainer -> DEBU 1ab2 created container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.comm] func1 -> DEBU 1ab3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ab6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ab7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [msp] DeserializeIdentity -> DEBU 1ab8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ab9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aba Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1abb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1abf 0xc003a4e2b0 gate 1556789258845498500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac0 0xc003a4e2b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc003a4e2b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc003a4e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [gossip.gossip] handleMessage -> DEBU 1ac3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc003a4e2b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac5 0xc003a4e2b0 gate 1556789258845498500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac9 0xc003a4eaf0 gate 1556789258845861800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1aca 0xc003a4eaf0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acb 0xc003a4eaf0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acc 0xc003a4eaf0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1acd Verify: digest = 00000000 b9 e8 c8 18 6f 9d 3e 6d e4 db 40 ad 21 56 4b 3c |....o.>m..@.!VK<|
peer0.org1.example.com | 00000010 a4 86 b0 50 90 b0 e7 94 fb 55 05 d0 63 1f e9 36 |...P.....U..c..6|"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1ace Verify: sig = 00000000 30 45 02 21 00 fd f3 f0 ec c2 b8 7f 14 9e 03 74 |0E.!...........t|
peer0.org1.example.com | 00000010 04 a9 1c e0 ed 3e a1 2f f3 8e 3e 28 fa 41 c3 51 |.....>./..>(.A.Q|
peer0.org1.example.com | 00000020 76 a2 7b bc c1 02 20 28 7d 04 5a 2c 0e f9 98 8c |v.{... (}.Z,....|
peer0.org1.example.com | 00000030 dc b5 9e 1d 1d b7 0c e3 91 cb b6 35 45 44 89 0d |...........5ED..|
peer0.org1.example.com | 00000040 54 60 40 9c ab 44 85 |T`@..D.|"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [cauthdsl] func2 -> DEBU 1acf 0xc003a4eaf0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc003a4eaf0 gate 1556789258845861800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ad5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ada Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1adb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1adc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.gossip] handleMessage -> DEBU 1add Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1adf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.comm] Send -> DEBU 1ae5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] Send -> DEBU 1ae7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.849 UTC [gossip.gossip] handleMessage -> DEBU 1aec Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aee Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:38.850 UTC [gossip.gossip] handleMessage -> DEBU 1af0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:38.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1af1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151017 "
peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af3 Sign: digest: 5435123D8FCA2ABD2119CACCF8DB800AFA6A0C6422688B3D59B6B1473F5FC6A3 "
peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1af6 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:39.083 UTC [msp] DeserializeIdentity -> DEBU 1af7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1af8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [gossip.comm] Send -> DEBU 1af9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1afa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1afb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [msp] DeserializeIdentity -> DEBU 1afd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afe Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1aff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b01 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b05 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b07 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [msp.identity] Verify -> DEBU 1b08 Verify: digest = 00000000 3a 3f 38 7f fe 97 0e 19 22 b4 02 42 a6 01 d3 41 |:?8....."..B...A|
peer0.org1.example.com | 00000010 87 29 96 17 73 49 a6 63 72 48 ff 18 de d1 e7 21 |.)..sI.crH.....!|"
peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b09 Verify: sig = 00000000 30 45 02 21 00 f0 d1 b4 40 7a 46 03 5c 48 ac e2 |0E.!....@zF.\H..|
peer0.org1.example.com | 00000010 90 b2 ef dd f6 2a d4 83 76 77 a4 f8 95 d6 0a bd |.....*..vw......|
peer0.org1.example.com | 00000020 51 43 ec 5f 21 02 20 11 5c ab d8 ad 7c f7 fe 29 |QC._!. .\...|..)|
peer0.org1.example.com | 00000030 66 01 03 a7 3f a8 da 1f 7e 12 31 09 ed e3 ef 80 |f...?...~.1.....|
peer0.org1.example.com | 00000040 68 17 ce 97 0e 5c b2 |h....\.|"
peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0b Verify: sig = 00000000 30 44 02 20 17 ee bc d5 e1 16 a9 bf 02 e9 cc 26 |0D. ...........&|
peer0.org1.example.com | 00000010 94 c1 26 18 fc 87 c0 a7 b5 30 2e 53 fd cb 14 b8 |..&......0.S....|
peer0.org1.example.com | 00000020 5a 6f f8 14 02 20 67 54 cf 88 86 d0 ff 0f cd c4 |Zo... gT........|
peer0.org1.example.com | 00000030 d3 e2 7e c9 34 97 3d f7 13 f4 f9 d9 da c6 6a 60 |..~.4.=.......j`|
peer0.org1.example.com | 00000040 3d 19 57 d3 2f 80 |=.W./.|"
peer0.org1.example.com | "2019-05-02 09:27:39.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b0c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b10 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b11 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b12 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b13 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b14 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b15 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b16 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [gossip.comm] Send -> DEBU 1b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b18 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] Send -> DEBU 1b19 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b21 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.199 UTC [gossip.gossip] handleMessage -> DEBU 1b22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.gossip] handleMessage -> DEBU 1b23 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b25 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:39.201 UTC [msp] DeserializeIdentity -> DEBU 1b26 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b28 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b29 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc003ab68a0 gate 1556789259210092600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2e 0xc003ab68a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2f 0xc003ab68a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b30 0xc003ab68a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b31 0xc003ab68a0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b32 0xc003ab68a0 gate 1556789259210092600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b36 0xc003ab70e0 gate 1556789259210695600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b37 0xc003ab70e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b38 0xc003ab70e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b39 0xc003ab70e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 06 38 3f 95 2b 07 df 57 0c 2f c7 f2 2a 16 9c cb |.8?.+..W./..*...|
peer0.org1.example.com | 00000010 dc ec c0 38 6d e0 74 4c f1 4a 37 42 d3 31 60 dc |...8m.tL.J7B.1`.|"
peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 25 dd c0 ef 9d ef c0 b5 fa ee e4 2a |0D. %..........*|
peer0.org1.example.com | 00000010 75 c7 f5 f1 a6 ef 86 f1 20 89 0c c4 6c bf c7 66 |u....... ...l..f|
peer0.org1.example.com | 00000020 f8 9a 3d c3 02 20 49 6e bd 60 4b d3 88 72 bf 97 |..=.. In.`K..r..|
peer0.org1.example.com | 00000030 90 8f 1f fe 4a 7c a6 ca 11 43 a7 e9 d4 a7 11 50 |....J|...C.....P|
peer0.org1.example.com | 00000040 66 d6 1f bd a0 48 |f....H|"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003ab70e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc003ab70e0 gate 1556789259210695600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b40 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b42 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b43 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b44 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b45 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 "
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b46 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b47 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b48 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b49 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [msp] DeserializeIdentity -> DEBU 1b4a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b51 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b52 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b53 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b54 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b55 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b56 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b57 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.comm] func1 -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b5a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b60 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [dockercontroller] Start -> DEBU 1b61 Started container peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b"
peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b62 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)"
peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b63 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock"
peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b64 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock"
peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b65 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)"
peer0.org1.example.com | "2019-05-02 09:27:39.310 UTC [chaincode.accesscontrol] authenticate -> DEBU 1b66 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized"
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] handleMessage -> DEBU 1b67 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b68 Received REGISTER in state created"
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] Register -> DEBU 1b69 registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b"
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6a Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED"
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6b Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" "
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6c sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" "
peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6d Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" "
peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [chaincode] Launch -> DEBU 1b6e launch complete"
peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [stateleveldb] GetState -> DEBU 1b6f GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [chaincode] Execute -> DEBU 1b70 Entry"
peer0.org1.example.com | "2019-05-02 09:27:39.313 UTC [chaincode] handleMessage -> DEBU 1b71 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b72 [592858be] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b73 [592858be] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] handleMessage -> DEBU 1b74 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b75 [592858be] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b76 [592858be] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:39.316 UTC [chaincode] handleMessage -> DEBU 1b77 [592858be] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [chaincode] Notify -> DEBU 1b78 [592858be] notifying Txid:592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [chaincode] Execute -> DEBU 1b79 Exit"
peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [endorser] callChaincode -> INFO 1b7a [businesschannel][592858be] Exit chaincode: name:"exp02" (1034ms)"
peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1b7b Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] Done -> DEBU 1b7c Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]"
peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [endorser] SimulateProposal -> DEBU 1b7d [businesschannel][592858be] Exit"
peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7e [businesschannel][592858be] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7f [businesschannel][592858be] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] EndorseWithPlugin -> DEBU 1b80 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b81 Sign: plaintext: 0A209D4D9AFEF5B3DE6A23F5712CD2CB...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b82 Sign: digest: 26D8B924113487C937059D11EFBCBE441B8B07F1F20F249D8B345C4643402A34 "
peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [endorser] EndorseWithPlugin -> DEBU 1b83 Exiting {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:39.321 UTC [endorser] endorseProposal -> DEBU 1b84 [businesschannel][592858be] Exit"
peer0.org1.example.com | "2019-05-02 09:27:39.321 UTC [lockbasedtxmgr] Done -> DEBU 1b85 Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]"
peer0.org1.example.com | "2019-05-02 09:27:39.322 UTC [endorser] func1 -> DEBU 1b86 Exit: request from 172.18.0.8:57334"
peer0.org1.example.com | "2019-05-02 09:27:39.322 UTC [comm.grpc.server] 1 -> INFO 1b87 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57334 grpc.code=OK grpc.call_duration=1.0480193s
peer0.org1.example.com | "2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b88 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b89 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:40.284 UTC [msp] DeserializeIdentity -> DEBU 1b8a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.285 UTC [msp] DeserializeIdentity -> DEBU 1b8b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.285 UTC [gossip.comm] Send -> DEBU 1b8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.287 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b90 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b91 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b92 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b94 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b95 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b97 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.290 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b98 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.290 UTC [policies] Evaluate -> DEBU 1b99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [cauthdsl] func1 -> DEBU 1b9c 0xc003b3c5e0 gate 1556789260291828700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9d 0xc003b3c5e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9e 0xc003b3c5e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc003b3c5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc003b3c5e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func1 -> DEBU 1ba1 0xc003b3c5e0 gate 1556789260291828700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [policies] Evaluate -> DEBU 1ba4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func1 -> DEBU 1ba5 0xc003b3ce20 gate 1556789260294068300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc003b3ce20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc003b3ce20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc003b3ce20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1ba9 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.|
peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|"
peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1baa Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.|
peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._|
peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.|
peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#|
peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|"
peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [cauthdsl] func2 -> DEBU 1bab 0xc003b3ce20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [cauthdsl] func1 -> DEBU 1bac 0xc003b3ce20 gate 1556789260294068300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bad Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1baf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1bb0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..|
peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|"
peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v|
peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E|
peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p|
peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.|
peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|"
peer0.org1.example.com | "2019-05-02 09:27:40.297 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [msp.identity] Verify -> DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func1 -> DEBU 1bba 0xc003b52c40 gate 1556789260299564700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbb 0xc003b52c40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc003b52c40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [cauthdsl] func2 -> DEBU 1bbd 0xc003b52c40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bbf Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bc0 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [gossip.comm] func1 -> DEBU 1bbe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] Send -> DEBU 1bc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.303 UTC [cauthdsl] func2 -> DEBU 1bcc 0xc003b52c40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.304 UTC [cauthdsl] func1 -> DEBU 1bcd 0xc003b52c40 gate 1556789260299564700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.304 UTC [policies] Evaluate -> DEBU 1bce Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bd0 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.306 UTC [policies] Evaluate -> DEBU 1bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.306 UTC [msp] DeserializeIdentity -> DEBU 1bd2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.307 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.307 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bd4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.310 UTC [cauthdsl] func1 -> DEBU 1bda 0xc003b7c410 gate 1556789260310338200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.310 UTC [cauthdsl] func2 -> DEBU 1bdb 0xc003b7c410 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdc 0xc003b7c410 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdd 0xc003b7c410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bde 0xc003b7c410 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.312 UTC [cauthdsl] func1 -> DEBU 1bdf 0xc003b7c410 gate 1556789260310338200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.312 UTC [policies] Evaluate -> DEBU 1be0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [cauthdsl] func1 -> DEBU 1be3 0xc003b7cc50 gate 1556789260313828300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be4 0xc003b7cc50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be5 0xc003b7cc50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be6 0xc003b7cc50 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be7 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be8 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:40.315 UTC [cauthdsl] func2 -> DEBU 1be9 0xc003b7cc50 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [cauthdsl] func1 -> DEBU 1bea 0xc003b7cc50 gate 1556789260313828300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1beb Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bed Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [policies] Evaluate -> DEBU 1bee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bef Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bf0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.318 UTC [msp] DeserializeIdentity -> DEBU 1bf1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..|
peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|"
peer0.org1.example.com | "2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v|
peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E|
peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p|
peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.|
peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|"
peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf4 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..|
peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|"
peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf5 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..|
peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...|
peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.|
peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B|
peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|"
peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [msp] DeserializeIdentity -> DEBU 1bf7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bf8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bfa Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [policies] Evaluate -> DEBU 1bfb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc003b915a0 gate 1556789260325535300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1bff 0xc003b915a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1c00 0xc003b915a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c01 0xc003b915a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c02 0xc003b915a0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c03 0xc003b915a0 gate 1556789260325535300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c04 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c07 0xc003b91de0 gate 1556789260326613300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c08 0xc003b91de0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c09 0xc003b91de0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0a 0xc003b91de0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0b Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0c Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0d 0xc003b91de0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func1 -> DEBU 1c0e 0xc003b91de0 gate 1556789260326613300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [policies] Evaluate -> DEBU 1c0f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c11 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [msp] DeserializeIdentity -> DEBU 1c13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c14 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c15 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [policies] Evaluate -> DEBU 1c18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func1 -> DEBU 1c19 0xc003ba4ec0 gate 1556789260329112500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1a 0xc003ba4ec0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1b 0xc003ba4ec0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1c 0xc003ba4ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003ba4ec0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc003ba4ec0 gate 1556789260329112500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c22 0xc003ba5700 gate 1556789260330784200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c23 0xc003ba5700 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c24 0xc003ba5700 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c25 0xc003ba5700 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c26 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c27 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003ba5700 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [cauthdsl] func1 -> DEBU 1c29 0xc003ba5700 gate 1556789260330784200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c31 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c32 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func1 -> DEBU 1c36 0xc003bb2ed0 gate 1556789260334562900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c37 0xc003bb2ed0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c38 0xc003bb2ed0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c39 0xc003bb2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc003bb2ed0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3b 0xc003bb2ed0 gate 1556789260334562900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3f 0xc003bb3710 gate 1556789260335788700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c40 0xc003bb3710 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c41 0xc003bb3710 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c42 0xc003bb3710 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c43 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c44 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c45 0xc003bb3710 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func1 -> DEBU 1c46 0xc003bb3710 gate 1556789260335788700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c49 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c51 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c52 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c56 0xc003bd1220 gate 1556789260339588400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c57 0xc003bd1220 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c58 0xc003bd1220 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c59 0xc003bd1220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc003bd1220 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c5b 0xc003bd1220 gate 1556789260339588400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003bd1a60 gate 1556789260340489500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003bd1a60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003bd1a60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003bd1a60 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c63 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c64 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [cauthdsl] func2 -> DEBU 1c65 0xc003bd1a60 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [cauthdsl] func1 -> DEBU 1c66 0xc003bd1a60 gate 1556789260340489500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c67 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c69 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6b Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6c Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c70 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c71 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c75 0xc003bdf950 gate 1556789260344414800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c76 0xc003bdf950 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c77 0xc003bdf950 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c78 0xc003bdf950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c79 0xc003bdf950 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c7a 0xc003bdf950 gate 1556789260344414800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func1 -> DEBU 1c7e 0xc003bf8190 gate 1556789260345325700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc003bf8190 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c80 0xc003bf8190 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c81 0xc003bf8190 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c82 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c83 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [cauthdsl] func2 -> DEBU 1c84 0xc003bf8190 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [cauthdsl] func1 -> DEBU 1c85 0xc003bf8190 gate 1556789260345325700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c88 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8a Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O|
peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|"
peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8b Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.|
peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.|
peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.|
peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.|
peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|"
peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [gossip.gossip] handleMessage -> DEBU 1c8c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.542 UTC [gossip.gossip] handleMessage -> DEBU 1c8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.542 UTC [msp] DeserializeIdentity -> DEBU 1c8e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.543 UTC [msp] DeserializeIdentity -> DEBU 1c8f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.543 UTC [gossip.gossip] handleMessage -> DEBU 1c90 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.556 UTC [gossip.gossip] handleMessage -> DEBU 1c91 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c92 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c93 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [gossip.gossip] handleMessage -> DEBU 1c94 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.571 UTC [gossip.gossip] handleMessage -> DEBU 1c95 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c96 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c97 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp] DeserializeIdentity -> DEBU 1c98 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [gossip.gossip] handleMessage -> DEBU 1c99 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.gossip] handleMessage -> DEBU 1c9a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11865534258867357685 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.pull] HandleMessage -> DEBU 1c9b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11865534258867357685 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.pull] SendDigest -> DEBU 1c9c Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:40.578 UTC [gossip.gossip] handleMessage -> DEBU 1c9d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.789 UTC [gossip.gossip] handleMessage -> DEBU 1c9e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.790 UTC [msp] DeserializeIdentity -> DEBU 1c9f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.792 UTC [gossip.gossip] handleMessage -> DEBU 1ca2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.795 UTC [gossip.gossip] handleMessage -> DEBU 1ca3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789256919750900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.795 UTC [msp] DeserializeIdentity -> DEBU 1ca4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.798 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.798 UTC [cauthdsl] func1 -> DEBU 1cab 0xc003c0d510 gate 1556789260798747100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cac 0xc003c0d510 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cad 0xc003c0d510 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1cae 0xc003c0d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1caf 0xc003c0d510 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func1 -> DEBU 1cb0 0xc003c0d510 gate 1556789260798747100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [policies] Evaluate -> DEBU 1cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.802 UTC [cauthdsl] func1 -> DEBU 1cb4 0xc003c0dd50 gate 1556789260801989700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb5 0xc003c0dd50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb6 0xc003c0dd50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003c0dd50 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb8 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb9 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:40.807 UTC [cauthdsl] func2 -> DEBU 1cba 0xc003c0dd50 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.807 UTC [cauthdsl] func1 -> DEBU 1cbb 0xc003c0dd50 gate 1556789260801989700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.808 UTC [policies] Evaluate -> DEBU 1cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.810 UTC [msp] DeserializeIdentity -> DEBU 1cc0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.810 UTC [gossip.gossip] handleMessage -> DEBU 1cc1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.comm] func1 -> DEBU 1cc2 Got message: GossipMessage: tag:EMPTY hello:<nonce:13395834411560050054 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.gossip] handleMessage -> DEBU 1cc3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:13395834411560050054 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.pull] HandleMessage -> DEBU 1cc4 GossipMessage: tag:EMPTY hello:<nonce:13395834411560050054 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [msp] DeserializeIdentity -> DEBU 1cc5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cc9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [gossip.pull] SendDigest -> DEBU 1ccb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [gossip.gossip] handleMessage -> DEBU 1ccc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.comm] func1 -> DEBU 1ccd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1cce Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1ccf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cd1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [msp] DeserializeIdentity -> DEBU 1cd2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func1 -> DEBU 1cd9 0xc003c17500 gate 1556789260867404700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cda 0xc003c17500 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cdb 0xc003c17500 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdc 0xc003c17500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdd 0xc003c17500 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func1 -> DEBU 1cde 0xc003c17500 gate 1556789260867404700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1cdf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func1 -> DEBU 1ce2 0xc003c17d40 gate 1556789260869158300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce3 0xc003c17d40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce4 0xc003c17d40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce5 0xc003c17d40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce6 Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=|
peer0.org1.example.com | 00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|"
peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce7 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..|
peer0.org1.example.com | 00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.|
peer0.org1.example.com | 00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..|
peer0.org1.example.com | 00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........|
peer0.org1.example.com | 00000040 28 7e fa 04 8e 0b |(~....|"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [cauthdsl] func2 -> DEBU 1ce8 0xc003c17d40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [cauthdsl] func1 -> DEBU 1ce9 0xc003c17d40 gate 1556789260869158300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cea Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ceb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cec Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ced == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cee Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cef Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] sendMemResponse -> DEBU 1cf6 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [msp] DeserializeIdentity -> DEBU 1cf9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] Send -> DEBU 1cfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.discovery] sendMemResponse -> DEBU 1cfb Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.012 UTC [msp] DeserializeIdentity -> DEBU 1cfe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.013 UTC [msp] DeserializeIdentity -> DEBU 1cff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.014 UTC [gossip.pull] Hello -> DEBU 1d00 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:41.014 UTC [msp] DeserializeIdentity -> DEBU 1d01 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [msp] DeserializeIdentity -> DEBU 1d02 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] Send -> DEBU 1d03 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3547945905709500911 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3547945905709500911 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d05 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.017 UTC [gossip.gossip] handleMessage -> DEBU 1d06 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.018 UTC [gossip.pull] HandleMessage -> DEBU 1d07 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.018 UTC [gossip.gossip] handleMessage -> DEBU 1d08 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.020 UTC [gossip.comm] func1 -> DEBU 1d09 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.021 UTC [gossip.gossip] handleMessage -> DEBU 1d0a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.021 UTC [msp] DeserializeIdentity -> DEBU 1d0b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.023 UTC [gossip.gossip] handleMessage -> DEBU 1d0e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.122 UTC [gossip.pull] Hello -> DEBU 1d0f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:41.123 UTC [gossip.comm] Send -> DEBU 1d10 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17711904648864407508 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.123 UTC [gossip.pull] Hello -> DEBU 1d11 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:41.124 UTC [gossip.comm] Send -> DEBU 1d12 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:452822413790425751 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.124 UTC [gossip.pull] Hello -> DEBU 1d13 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] Send -> DEBU 1d14 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3795338519098677057 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3795338519098677057 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d16 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17711904648864407508 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d18 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:452822413790425751 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d1a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.129 UTC [gossip.gossip] handleMessage -> DEBU 1d1b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.pull] HandleMessage -> DEBU 1d1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.gossip] handleMessage -> DEBU 1d1d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.comm] func1 -> DEBU 1d1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.134 UTC [gossip.gossip] handleMessage -> DEBU 1d1f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.136 UTC [gossip.pull] HandleMessage -> DEBU 1d20 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.136 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.137 UTC [gossip.gossip] handleMessage -> DEBU 1d22 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:9671078838692260213 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.141 UTC [gossip.pull] HandleMessage -> DEBU 1d23 GossipMessage: tag:EMPTY hello:<nonce:9671078838692260213 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.142 UTC [gossip.pull] SendDigest -> DEBU 1d24 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:41.143 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d26 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151018 "
peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d28 Sign: digest: FA58178E144539AB902280544495A83B2DED1A8040F6EC2200578D7FC874FDD0 "
peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d29 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [msp.identity] Sign -> DEBU 1d2a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [gossip.gossip] handleMessage -> DEBU 1d27 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [gossip.comm] Send -> DEBU 1d2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.147 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.147 UTC [gossip.comm] Send -> DEBU 1d2e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.148 UTC [msp] DeserializeIdentity -> DEBU 1d2f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] Send -> DEBU 1d30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d32 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.150 UTC [gossip.comm] sendToEndpoint -> DEBU 1d33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.151 UTC [gossip.comm] sendToEndpoint -> DEBU 1d34 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.153 UTC [gossip.comm] sendToEndpoint -> DEBU 1d35 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.154 UTC [gossip.comm] sendToEndpoint -> DEBU 1d36 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [gossip.pull] HandleMessage -> DEBU 1d2c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.157 UTC [gossip.gossip] handleMessage -> DEBU 1d37 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.160 UTC [gossip.gossip] handleMessage -> DEBU 1d38 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3b Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y|
peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|"
peer0.org1.example.com | "2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3c Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N|
peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.|
peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.|
peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...|
peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|"
peer0.org1.example.com | "2019-05-02 09:27:41.165 UTC [msp.identity] Verify -> DEBU 1d3d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:41.166 UTC [msp.identity] Verify -> DEBU 1d3e Verify: sig = 00000000 30 44 02 20 2a 04 e7 cf b7 a3 e7 ce 8b a7 97 62 |0D. *..........b|
peer0.org1.example.com | 00000010 97 d0 40 2e cb 6f f3 1f e9 e8 a3 8b e7 da f2 13 |..@..o..........|
peer0.org1.example.com | 00000020 a6 7b 99 d1 02 20 32 fb 5d fc 5b 97 8c fb 0c a7 |.{... 2.].[.....|
peer0.org1.example.com | 00000030 cd 4b ab 37 64 7b 59 cf 93 1c 69 b9 14 59 9e 0a |.K.7d{Y...i..Y..|
peer0.org1.example.com | 00000040 e9 71 71 49 18 57 |.qqI.W|"
peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d3f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d40 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d41 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d42 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d43 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:41.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d44 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d45 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d46 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.161 UTC [gossip.gossip] handleMessage -> DEBU 1d47 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.171 UTC [gossip.comm] func1 -> DEBU 1d48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.171 UTC [gossip.discovery] sendMemResponse -> DEBU 1d49 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] Send -> DEBU 1d4d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.discovery] sendMemResponse -> DEBU 1d4e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d50 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d51 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.174 UTC [gossip.gossip] handleMessage -> DEBU 1d53 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d54 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d55 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;|
peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|"
peer0.org1.example.com | "2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d56 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.|
peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..|
peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...|
peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z|
peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|"
peer0.org1.example.com | "2019-05-02 09:27:41.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d57 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.178 UTC [gossip.discovery] isSentByMe -> DEBU 1d58 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d59 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.179 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d5a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.179 UTC [msp] DeserializeIdentity -> DEBU 1d5b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.180 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:41.183 UTC [policies] Evaluate -> DEBU 1d61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.183 UTC [cauthdsl] func1 -> DEBU 1d62 0xc003ccc3d0 gate 1556789261183711000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d63 0xc003ccc3d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d64 0xc003ccc3d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d65 0xc003ccc3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d66 0xc003ccc3d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d67 0xc003ccc3d0 gate 1556789261183711000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d6b 0xc003cccc10 gate 1556789261186702500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6c 0xc003cccc10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6d 0xc003cccc10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6e 0xc003cccc10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d6f Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=|
peer0.org1.example.com | 00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|"
peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d70 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..|
peer0.org1.example.com | 00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.|
peer0.org1.example.com | 00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..|
peer0.org1.example.com | 00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........|
peer0.org1.example.com | 00000040 28 7e fa 04 8e 0b |(~....|"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [cauthdsl] func2 -> DEBU 1d71 0xc003cccc10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [cauthdsl] func1 -> DEBU 1d72 0xc003cccc10 gate 1556789261186702500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d75 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d77 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d78 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d79 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7a Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y|
peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7b Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N|
peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.|
peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.|
peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...|
peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d7e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d7f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d80 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.190 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d82 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d83 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;|
peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|"
peer0.org1.example.com | "2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d84 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.|
peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..|
peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...|
peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z|
peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|"
peer0.org1.example.com | "2019-05-02 09:27:41.194 UTC [msp.identity] Verify -> DEBU 1d85 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:41.195 UTC [msp.identity] Verify -> DEBU 1d86 Verify: sig = 00000000 30 44 02 20 2a d2 c2 12 a8 13 3a 5f 16 fd c4 be |0D. *.....:_....|
peer0.org1.example.com | 00000010 0d d5 ed 0c fa b3 33 59 c3 de 7f cd 5e df 12 43 |......3Y....^..C|
peer0.org1.example.com | 00000020 96 c5 10 0f 02 20 0e eb 19 07 56 59 bd b1 ef 15 |..... ....VY....|
peer0.org1.example.com | 00000030 82 da 0b ef 5e 75 78 7f b1 74 bd 69 c1 92 98 54 |....^ux..t.i...T|
peer0.org1.example.com | 00000040 7a 4d f9 10 54 80 |zM..T.|"
peer0.org1.example.com | "2019-05-02 09:27:41.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.196 UTC [gossip.discovery] isSentByMe -> DEBU 1d88 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d89 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d8a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.200 UTC [gossip.gossip] handleMessage -> DEBU 1d8b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.201 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:12733339119301227040 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.201 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY hello:<nonce:12733339119301227040 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d90 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d91 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d92 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d93 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.205 UTC [gossip.pull] SendDigest -> DEBU 1d94 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:41.205 UTC [gossip.gossip] handleMessage -> DEBU 1d95 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.208 UTC [gossip.gossip] handleMessage -> DEBU 1d96 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d98 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d99 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;|
peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|"
peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d9a Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.|
peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..|
peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...|
peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z|
peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|"
peer0.org1.example.com | "2019-05-02 09:27:41.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.213 UTC [gossip.discovery] isSentByMe -> DEBU 1d9c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.216 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d9e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1d9f Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y|
peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|"
peer0.org1.example.com | "2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1da0 Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N|
peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.|
peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.|
peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...|
peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|"
peer0.org1.example.com | "2019-05-02 09:27:41.219 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.220 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.220 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.221 UTC [gossip.gossip] handleMessage -> DEBU 1da4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.222 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:41.222 UTC [msp] DeserializeIdentity -> DEBU 1da7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1daa Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [policies] Evaluate -> DEBU 1dad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [cauthdsl] func1 -> DEBU 1dae 0xc003d14170 gate 1556789261225384700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [cauthdsl] func2 -> DEBU 1daf 0xc003d14170 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db0 0xc003d14170 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db1 0xc003d14170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db2 0xc003d14170 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [cauthdsl] func1 -> DEBU 1db3 0xc003d14170 gate 1556789261225384700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.228 UTC [policies] Evaluate -> DEBU 1db6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003d149b0 gate 1556789261228997600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db8 0xc003d149b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db9 0xc003d149b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1dba 0xc003d149b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.230 UTC [msp.identity] Verify -> DEBU 1dbb Verify: digest = 00000000 90 bf 7e ad 48 8a 1d b6 5e 7b dc 13 f8 89 be 2c |..~.H...^{.....,|
peer0.org1.example.com | 00000010 1f b7 a5 6a 3c ed 18 74 a5 d1 7d 6b 92 e9 e9 1f |...j<..t..}k....|"
peer0.org1.example.com | "2019-05-02 09:27:41.231 UTC [msp.identity] Verify -> DEBU 1dbc Verify: sig = 00000000 30 44 02 20 21 b1 f4 ee cc 7e 8c b3 81 27 eb ae |0D. !....~...'..|
peer0.org1.example.com | 00000010 28 db f4 cc ee 59 6c 92 b5 e9 cd 7a 6b e1 1e 8a |(....Yl....zk...|
peer0.org1.example.com | 00000020 44 ae 0c 86 02 20 6b 82 88 ae 32 20 46 a9 0f d4 |D.... k...2 F...|
peer0.org1.example.com | 00000030 05 5d 01 94 06 a2 a3 20 cc 1a 4b e7 d7 cd 86 c8 |.]..... ..K.....|
peer0.org1.example.com | 00000040 0b 3c 9c 95 9c 32 |.<...2|"
peer0.org1.example.com | "2019-05-02 09:27:41.231 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003d149b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [cauthdsl] func1 -> DEBU 1dbe 0xc003d149b0 gate 1556789261228997600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dbf Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 "
peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.236 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.236 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dca Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [gossip.discovery] sendMemResponse -> DEBU 1dcb Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] Send -> DEBU 1dcf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.discovery] sendMemResponse -> DEBU 1dd0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd4 Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func1 -> DEBU 1dd8 0xc003ce9d40 gate 1556789261422705000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dd9 0xc003ce9d40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dda 0xc003ce9d40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1ddb 0xc003ce9d40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddc Verify: digest = 00000000 40 a2 dd 9d 7b 76 d5 1a f2 e4 04 cb 21 91 cc 70 |@...{v......!..p|
peer0.org1.example.com | 00000010 3a 2e 15 32 2d 93 23 20 3c 39 f6 bf 8e 0c ce 7e |:..2-.# <9.....~|"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddd Verify: sig = 00000000 30 45 02 21 00 87 e1 c1 bb cd 8b 6c 77 e4 a8 62 |0E.!.......lw..b|
peer0.org1.example.com | 00000010 56 40 c7 0b a4 57 d8 53 42 6e cc 9e f5 bd 2e b6 |V@...W.SBn......|
peer0.org1.example.com | 00000020 13 b4 c9 a5 83 02 20 32 b8 f6 ae c2 1b 1e 9e dc |...... 2........|
peer0.org1.example.com | 00000030 c9 f6 e1 a9 c2 a7 d9 52 df 7f 31 ac 35 e5 67 e4 |.......R..1.5.g.|
peer0.org1.example.com | 00000040 f1 17 a9 e7 00 15 26 |......&|"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [cauthdsl] func2 -> DEBU 1dde 0xc003ce9d40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [cauthdsl] func1 -> DEBU 1ddf 0xc003ce9d40 gate 1556789261422705000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de2 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [policies] Evaluate -> DEBU 1de3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de4 [businesschannel] Adding payload to local buffer, blockNum = [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de5 [businesschannel] Adding payload to local buffer, blockNum = [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de7 [businesschannel] Gossiping block [6], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.channel] AddToMsgStore -> DEBU 1de8 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.pull] Add -> DEBU 1de9 Added 6, total items: 6"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1dea [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1deb [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> INFO 1dec [businesschannel] Received block [6] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> DEBU 1ded [businesschannel] Validating block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1dee [businesschannel] START Block Validation for block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1def expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] validateTx -> DEBU 1df0 [businesschannel] validateTx starts for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df1 ValidateTransactionEnvelope starts for envelope 0xc003c4fb80"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df2 Header is channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " "
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] validateChannelHeader -> DEBU 1df3 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df4 begin"
peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp] GetManagerForChain -> DEBU 1df5 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df7 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......|
peer0.org1.example.com | 00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|"
peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..|
peer0.org1.example.com | 00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.|
peer0.org1.example.com | 00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@|
peer0.org1.example.com | 00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..|
peer0.org1.example.com | 00000040 ef 22 01 d3 23 c9 7c |."..#.||"
peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] Send -> DEBU 1dfe Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1dff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1e00 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e01 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e02 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:41.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e03 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:41.429 UTC [protoutils] validateEndorserTransaction -> DEBU 1e04 validateEndorserTransaction starts for data 0xc003051000, header channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " "
peer0.org1.example.com | "2019-05-02 09:27:41.430 UTC [protoutils] validateEndorserTransaction -> DEBU 1e05 validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [protoutils] validateEndorserTransaction -> DEBU 1e06 validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [protoutils] ValidateTransaction -> DEBU 1e07 ValidateTransactionEnvelope returns err %!s(<nil>)"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e08 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1e09 retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e0a Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] Dispatch -> DEBU 1e0b [businesschannel] Dispatch starts for bytes 0xc002cc9c00"
peer0.org1.example.com | "2019-05-02 09:27:41.432 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e0c constructing new query executor txid = [82160613-2f05-4f49-9d15-830e4c48078d]"
peer0.org1.example.com | "2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e0f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo"
peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e10 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo"
peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e11 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections"
peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [lockbasedtxmgr] Done -> DEBU 1e12 Done with transaction simulation / query execution [82160613-2f05-4f49-9d15-830e4c48078d]"
peer0.org1.example.com | "2019-05-02 09:27:41.435 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1e13 Validating Tx 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e14 constructing new query executor txid = [1b438ed2-7905-4f7d-9358-71d56705d63a]"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] Done -> DEBU 1e15 Done with transaction simulation / query execution [1b438ed2-7905-4f7d-9358-71d56705d63a]"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func1 -> DEBU 1e16 0xc003d571b0 gate 1556789261436520600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e17 0xc003d571b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e18 0xc003d571b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e19 0xc003d571b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [msp.identity] Verify -> DEBU 1e1a Verify: digest = 00000000 26 d8 b9 24 11 34 87 c9 37 05 9d 11 ef bc be 44 |&..$.4..7......D|
peer0.org1.example.com | 00000010 1b 8b 07 f1 f2 0f 24 9d 8b 34 5c 46 43 40 2a 34 |......$..4\FC@*4|"
peer0.org1.example.com | "2019-05-02 09:27:41.437 UTC [msp.identity] Verify -> DEBU 1e1b Verify: sig = 00000000 30 45 02 21 00 f5 68 12 4e de 79 d3 5c 88 af 65 |0E.!..h.N.y.\..e|
peer0.org1.example.com | 00000010 96 69 c0 64 55 77 fe 52 ae cd d9 59 9f 02 24 df |.i.dUw.R...Y..$.|
peer0.org1.example.com | 00000020 d7 42 62 8c 26 02 20 12 75 04 26 f2 63 ae 8d d0 |.Bb.&. .u.&.c...|
peer0.org1.example.com | 00000030 99 3e 57 a5 a3 17 0a 83 18 ef e6 a7 cc b7 34 07 |.>W...........4.|
peer0.org1.example.com | 00000040 69 16 4d 84 b8 1a 23 |i.M...#|"
peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1c 0xc003d571b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1d 0xc003d571b0 signed by 1 principal evaluation starts (used [true])"
peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1e 0xc003d571b0 skipping identity 0 because it has already been used"
peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1f 0xc003d571b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func1 -> DEBU 1e20 0xc003d571b0 gate 1556789261436520600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e21 constructing new query executor txid = [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]"
peer0.org1.example.com | "2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] Done -> DEBU 1e22 Done with transaction simulation / query execution [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]"
peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e23 constructing new query executor txid = [701bf816-2815-4547-b6db-4390dc6cb179]"
peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] Done -> DEBU 1e24 Done with transaction simulation / query execution [701bf816-2815-4547-b6db-4390dc6cb179]"
peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [vscc] Validate -> DEBU 1e25 block 6, namespace: exp02, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1e26 Transaction 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Dispatch -> DEBU 1e27 [businesschannel] Dispatch completes env bytes 0xc002cc9c00"
peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] validateTx -> DEBU 1e28 [businesschannel] validateTx completes for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> DEBU 1e29 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> INFO 1e2a [businesschannel] Validated block [6] in 17ms"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1e2b Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [gossip.privdata] StoreBlock -> DEBU 1e2c [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [kvledger] CommitWithPvtData -> DEBU 1e2d [businesschannel] Validating state for block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2e Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2f lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e30 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e31 ValidateAndPrepareBatch() for block number = [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e32 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] preprocessProtoBlock -> DEBU 1e33 txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [stateleveldb] GetState -> DEBU 1e34 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [statebasedval] validateKVRead -> DEBU 1e35 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:41.445 UTC [stateleveldb] GetState -> DEBU 1e36 GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:41.460 UTC [statebasedval] validateKVRead -> DEBU 1e37 Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)"
peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1e38 Block [6] Transaction index [0] TxId [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] marked as valid by state validator. ContainsPostOrderWrites [false]"
peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [valinternal] ApplyWriteSet -> DEBU 1e39 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc003d7c2c0), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003d7c300), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003d7c340)}"
peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3a validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3b postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3c ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:41.464 UTC [kvledger] CommitWithPvtData -> DEBU 1e3d [businesschannel] Committing block [6] to storage"
peer0.org1.example.com | "2019-05-02 09:27:41.464 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1e3e Writing block [6] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:41.467 UTC [pvtdatastorage] Prepare -> DEBU 1e3f Saved 0 private data write sets for block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e40 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets=
peer0.org1.example.com | txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e41 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:41.472 UTC [fsblkstorage] indexBlock -> DEBU 1e42 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx number:[0] ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:41.475 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e43 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90570], isChainEmpty=[false], lastBlockNumber=[6]"
peer0.org1.example.com | "2019-05-02 09:27:41.475 UTC [pvtdatastorage] Commit -> DEBU 1e44 Committing private data for block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.479 UTC [pvtdatastorage] Commit -> DEBU 1e45 Committed private data for block [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [kvledger] CommitWithPvtData -> DEBU 1e46 [businesschannel] Committing block [6] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e47 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e48 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1e49 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [lockbasedtxmgr] Commit -> DEBU 1e4a Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]"
peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]"
peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4d Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]"
peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [lockbasedtxmgr] Commit -> DEBU 1e4e Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e4f Preparing potential purge list working-set for expiringAtBlk [7]"
peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [leveldbhelper] GetIterator -> DEBU 1e50 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e51 No expiry entry found for expiringAtBlk [7]"
peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [lockbasedtxmgr] func1 -> DEBU 1e52 launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [kvledger] CommitWithPvtData -> DEBU 1e53 [businesschannel] Committing block [6] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [historyleveldb] Commit -> DEBU 1e54 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:41.487 UTC [historyleveldb] Commit -> DEBU 1e55 Channel [businesschannel]: Updates committed to history database for blockNo [6]"
peer0.org1.example.com | "2019-05-02 09:27:41.487 UTC [kvledger] CommitWithPvtData -> INFO 1e56 [businesschannel] Committed block [6] with 1 transaction(s) in 44ms (state_validation=19ms block_commit=17ms state_commit=5ms)"
peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e57 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020807 "
peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e58 Sign: digest: 68A091325825D2E9B4F1F6512D2FD9D16BA54DD8C9B8FFBB598257089B8E949A "
peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [gossip.state] commitBlock -> DEBU 1e59 [businesschannel] Committed block [6] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:42.345 UTC [gossip.election] waitForInterrupt -> DEBU 1e5a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:42.346 UTC [gossip.election] IsLeader -> DEBU 1e5b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:42.347 UTC [msp.identity] Sign -> DEBU 1e5c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510061801 "
peer0.org1.example.com | "2019-05-02 09:27:42.348 UTC [msp.identity] Sign -> DEBU 1e5d Sign: digest: E2F907E5E5A479A34581E8DDBBC40AFC349784B71B0DFE7B145B0B97208EB39A "
peer0.org1.example.com | "2019-05-02 09:27:42.349 UTC [gossip.election] waitForInterrupt -> DEBU 1e5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:42.350 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.351 UTC [msp] DeserializeIdentity -> DEBU 1e60 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e61 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e62 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [gossip.comm] Send -> DEBU 1e63 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e66 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.799 UTC [gossip.comm] func1 -> DEBU 1e68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.799 UTC [gossip.gossip] handleMessage -> DEBU 1e69 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.800 UTC [gossip.gossip] handleMessage -> DEBU 1e6a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.801 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e6c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:43.801 UTC [msp] DeserializeIdentity -> DEBU 1e6d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e6f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e70 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:43.804 UTC [policies] Evaluate -> DEBU 1e73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:43.805 UTC [cauthdsl] func1 -> DEBU 1e74 0xc003d47d60 gate 1556789263805675500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e75 0xc003d47d60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e76 0xc003d47d60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e77 0xc003d47d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [cauthdsl] func2 -> DEBU 1e78 0xc003d47d60 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [cauthdsl] func1 -> DEBU 1e79 0xc003d47d60 gate 1556789263805675500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [policies] Evaluate -> DEBU 1e7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.809 UTC [gossip.gossip] handleMessage -> DEBU 1e7b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [cauthdsl] func1 -> DEBU 1e7e 0xc003dbe5a0 gate 1556789263810763700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [cauthdsl] func2 -> DEBU 1e7f 0xc003dbe5a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e80 0xc003dbe5a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e81 0xc003dbe5a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e82 Verify: digest = 00000000 28 46 52 9b b2 72 1a 72 23 4c 78 9b 4e 9c 1b 2d |(FR..r.r#Lx.N..-|
peer0.org1.example.com | 00000010 e7 54 b2 af 7b e5 b8 ab f7 0f 19 46 94 fd 9c 7a |.T..{......F...z|"
peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e83 Verify: sig = 00000000 30 45 02 21 00 c5 90 8b 53 6b 52 f3 6f c6 89 7c |0E.!....SkR.o..||
peer0.org1.example.com | 00000010 48 bb 08 87 bc e2 c5 8d 34 2e 34 98 20 8b b7 3d |H.......4.4. ..=|
peer0.org1.example.com | 00000020 1d 95 0d 03 6a 02 20 24 27 46 dc 7e 33 d5 04 16 |....j. $'F.~3...|
peer0.org1.example.com | 00000030 46 e4 82 b6 8f 81 37 9b ed af d3 0f 23 21 35 6d |F.....7.....#!5m|
peer0.org1.example.com | 00000040 16 5c 28 d8 35 66 b1 |.\(.5f.|"
peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003dbe5a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [cauthdsl] func1 -> DEBU 1e85 0xc003dbe5a0 gate 1556789263810763700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [policies] Evaluate -> DEBU 1e86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e88 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e90 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e91 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e93 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e94 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e95 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e96 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e98 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.826 UTC [msp] DeserializeIdentity -> DEBU 1e99 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [gossip.comm] Send -> DEBU 1e9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] Send -> DEBU 1ea3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151019 "
peer0.org1.example.com | "2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea8 Sign: digest: 9D85DB97449275B80669AFF8894EDE65FDA6104E76700A673CB4A351732B805D "
peer0.org1.example.com | "2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1ea9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1eaa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:44.041 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1eab Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:44.051 UTC [msp] DeserializeIdentity -> DEBU 1eac Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1ead Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1eae Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.053 UTC [gossip.comm] Send -> DEBU 1eaf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [msp] DeserializeIdentity -> DEBU 1eb0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.088 UTC [gossip.gossip] handleMessage -> DEBU 1eb9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.089 UTC [gossip.gossip] handleMessage -> DEBU 1eba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ebc Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebd Verify: digest = 00000000 04 78 1d ad 0d ea 10 db 10 52 b6 42 fd bc 3d 70 |.x.......R.B..=p|
peer0.org1.example.com | 00000010 78 5f ff c6 02 c1 8b 99 9d 23 89 97 16 e1 3f b5 |x_.......#....?.|"
peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebe Verify: sig = 00000000 30 44 02 20 04 55 80 4c 13 fc f2 38 1b 02 d8 b5 |0D. .U.L...8....|
peer0.org1.example.com | 00000010 ba 04 69 04 c2 e3 8a 2a c4 71 ee c2 2c 07 e9 7c |..i....*.q..,..||
peer0.org1.example.com | 00000020 9d ac c8 02 02 20 22 a7 f1 e3 51 a6 98 8a 19 fb |..... "...Q.....|
peer0.org1.example.com | 00000030 c2 2f 0f 5a e6 31 c6 f3 92 b6 d8 75 77 e5 50 cc |./.Z.1.....uw.P.|
peer0.org1.example.com | 00000040 7b 99 ee de 4a 6d |{...Jm|"
peer0.org1.example.com | "2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ebf Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ec0 Verify: sig = 00000000 30 45 02 21 00 bc ec e2 79 4f 4e 7b 37 ec 9d 70 |0E.!....yON{7..p|
peer0.org1.example.com | 00000010 dd 72 e3 05 82 b4 4e 6c a6 81 55 b2 34 a0 d6 eb |.r....Nl..U.4...|
peer0.org1.example.com | 00000020 0a 3f 11 b7 cd 02 20 4a 53 54 e6 3a 2f 77 86 ef |.?.... JST.:/w..|
peer0.org1.example.com | 00000030 8c f8 4e 6a b5 1f bf 5e 5c 33 a7 34 2f cf 8f ad |..Nj...^\3.4/...|
peer0.org1.example.com | 00000040 10 48 65 d0 b8 54 ab |.He..T.|"
peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.094 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ec9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1eca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ecb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ecc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [msp] DeserializeIdentity -> DEBU 1ecd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ece Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] sendToEndpoint -> DEBU 1ecf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.099 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.comm] func1 -> DEBU 1ed3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1edb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.165 UTC [gossip.gossip] handleMessage -> DEBU 1edc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.gossip] handleMessage -> DEBU 1edd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ede Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1edf Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [msp] DeserializeIdentity -> DEBU 1ee0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ee1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee2 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee3 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.169 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc003dd5f60 gate 1556789264169434100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc003dd5f60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc003dd5f60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eea 0xc003dd5f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eeb 0xc003dd5f60 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func1 -> DEBU 1eec 0xc003dd5f60 gate 1556789264169434100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.173 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc003e1a7a0 gate 1556789264173382400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc003e1a7a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc003e1a7a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc003e1a7a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 50 65 5b 59 6d 12 85 e2 fc 2d 5d 26 c0 09 18 27 |Pe[Ym....-]&...'|
peer0.org1.example.com | 00000010 08 52 6c 4c 25 b4 d6 91 f0 7f f0 dc 74 dd 05 28 |.RlL%.......t..(|"
peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 44 02 20 79 6f fc 0c fa 91 38 79 90 03 31 74 |0D. yo....8y..1t|
peer0.org1.example.com | 00000010 a9 b0 f7 e8 85 23 c8 2a 5d 4d c2 25 80 da 30 77 |.....#.*]M.%..0w|
peer0.org1.example.com | 00000020 4d 35 46 ff 02 20 2c 58 d8 9f 04 e1 97 8b 6b 7c |M5F.. ,X......k||
peer0.org1.example.com | 00000030 01 ec 0f 11 97 6c 00 f8 b0 39 1e f4 f1 81 81 2b |.....l...9.....+|
peer0.org1.example.com | 00000040 e0 e9 6f 89 20 49 |..o. I|"
peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc003e1a7a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc003e1a7a0 gate 1556789264173382400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.178 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.182 UTC [gossip.comm] func1 -> DEBU 1efc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.183 UTC [gossip.gossip] handleMessage -> DEBU 1efd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1efe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1eff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f00 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f01 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 "
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f02 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f03 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f04 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f05 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.187 UTC [gossip.gossip] handleMessage -> DEBU 1f06 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f08 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.189 UTC [gossip.gossip] handleMessage -> DEBU 1f09 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.gossip] handleMessage -> DEBU 1f0a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.195 UTC [msp] DeserializeIdentity -> DEBU 1f0d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f10 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f11 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f12 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [gossip.comm] Send -> DEBU 1f14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [msp] DeserializeIdentity -> DEBU 1f15 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [gossip.comm] Send -> DEBU 1f17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [gossip.comm] sendToEndpoint -> DEBU 1f16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f19 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] Send -> DEBU 1f1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f22 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f23 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f21 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.251 UTC [gossip.comm] func1 -> DEBU 1f24 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.252 UTC [gossip.gossip] handleMessage -> DEBU 1f25 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.254 UTC [msp] DeserializeIdentity -> DEBU 1f26 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.255 UTC [msp] DeserializeIdentity -> DEBU 1f27 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f28 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f2a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [gossip.comm] Send -> DEBU 1f2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f30 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f29 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f33 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f34 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [policies] Evaluate -> DEBU 1f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [cauthdsl] func1 -> DEBU 1f38 0xc003e55d90 gate 1556789264262544200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [cauthdsl] func2 -> DEBU 1f39 0xc003e55d90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3a 0xc003e55d90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3b 0xc003e55d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3c 0xc003e55d90 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.264 UTC [cauthdsl] func1 -> DEBU 1f3d 0xc003e55d90 gate 1556789264262544200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.264 UTC [policies] Evaluate -> DEBU 1f3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f40 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f31 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1f42 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.266 UTC [cauthdsl] func1 -> DEBU 1f43 0xc003e34eb0 gate 1556789264266730200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f44 0xc003e34eb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f45 0xc003e34eb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f46 0xc003e34eb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f47 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f48 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:44.279 UTC [gossip.comm] func1 -> DEBU 1f49 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.280 UTC [cauthdsl] func2 -> DEBU 1f4a 0xc003e34eb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.281 UTC [cauthdsl] func1 -> DEBU 1f4b 0xc003e34eb0 gate 1556789264266730200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.281 UTC [policies] Evaluate -> DEBU 1f4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.283 UTC [msp.identity] Verify -> DEBU 1f50 Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O|
peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|"
peer0.org1.example.com | "2019-05-02 09:27:44.284 UTC [msp.identity] Verify -> DEBU 1f51 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.|
peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.|
peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.|
peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.|
peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|"
peer0.org1.example.com | "2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f52 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f53 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f55 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f57 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f58 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.290 UTC [policies] Evaluate -> DEBU 1f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.290 UTC [cauthdsl] func1 -> DEBU 1f5c 0xc003e8b4c0 gate 1556789264290953900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5d 0xc003e8b4c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc003e8b4c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.292 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc003e8b4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.293 UTC [cauthdsl] func2 -> DEBU 1f60 0xc003e8b4c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.293 UTC [cauthdsl] func1 -> DEBU 1f61 0xc003e8b4c0 gate 1556789264290953900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f62 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.295 UTC [policies] Evaluate -> DEBU 1f64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.295 UTC [cauthdsl] func1 -> DEBU 1f65 0xc003e8bd00 gate 1556789264295698200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f66 0xc003e8bd00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f67 0xc003e8bd00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.297 UTC [cauthdsl] func2 -> DEBU 1f68 0xc003e8bd00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.297 UTC [msp.identity] Verify -> DEBU 1f69 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:44.298 UTC [msp.identity] Verify -> DEBU 1f6a Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:44.298 UTC [cauthdsl] func2 -> DEBU 1f6b 0xc003e8bd00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [cauthdsl] func1 -> DEBU 1f6c 0xc003e8bd00 gate 1556789264295698200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f6f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f72 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [policies] Evaluate -> DEBU 1f74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.306 UTC [cauthdsl] func1 -> DEBU 1f77 0xc003e9cde0 gate 1556789264306204300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.306 UTC [cauthdsl] func2 -> DEBU 1f78 0xc003e9cde0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f79 0xc003e9cde0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc003e9cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7b 0xc003e9cde0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f7c 0xc003e9cde0 gate 1556789264306204300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f80 0xc003e9d620 gate 1556789264308941300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f81 0xc003e9d620 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f82 0xc003e9d620 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f83 0xc003e9d620 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f84 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f85 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f86 0xc003e9d620 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func1 -> DEBU 1f87 0xc003e9d620 gate 1556789264308941300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f90 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f91 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f92 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.314 UTC [policies] Evaluate -> DEBU 1f95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.315 UTC [cauthdsl] func1 -> DEBU 1f96 0xc003eb1030 gate 1556789264315836700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.316 UTC [cauthdsl] func2 -> DEBU 1f97 0xc003eb1030 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.317 UTC [cauthdsl] func2 -> DEBU 1f98 0xc003eb1030 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.318 UTC [cauthdsl] func2 -> DEBU 1f99 0xc003eb1030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.319 UTC [cauthdsl] func2 -> DEBU 1f9a 0xc003eb1030 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.320 UTC [cauthdsl] func1 -> DEBU 1f9b 0xc003eb1030 gate 1556789264315836700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.323 UTC [policies] Evaluate -> DEBU 1f9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.324 UTC [cauthdsl] func1 -> DEBU 1f9f 0xc003eb1870 gate 1556789264324374400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.325 UTC [cauthdsl] func2 -> DEBU 1fa0 0xc003eb1870 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.326 UTC [cauthdsl] func2 -> DEBU 1fa1 0xc003eb1870 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.327 UTC [cauthdsl] func2 -> DEBU 1fa2 0xc003eb1870 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.327 UTC [msp.identity] Verify -> DEBU 1fa3 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS|
peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|"
peer0.org1.example.com | "2019-05-02 09:27:44.328 UTC [msp.identity] Verify -> DEBU 1fa4 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%|
peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r|
peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...|
peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.|
peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|"
peer0.org1.example.com | "2019-05-02 09:27:44.331 UTC [cauthdsl] func2 -> DEBU 1fa5 0xc003eb1870 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.332 UTC [cauthdsl] func1 -> DEBU 1fa6 0xc003eb1870 gate 1556789264324374400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.332 UTC [policies] Evaluate -> DEBU 1fa7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa9 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.334 UTC [policies] Evaluate -> DEBU 1faa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.335 UTC [msp.identity] Verify -> DEBU 1fab Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O|
peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|"
peer0.org1.example.com | "2019-05-02 09:27:44.336 UTC [msp.identity] Verify -> DEBU 1fac Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.|
peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.|
peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.|
peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.|
peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|"
peer0.org1.example.com | "2019-05-02 09:27:44.337 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.338 UTC [msp] DeserializeIdentity -> DEBU 1fae Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1faf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb0 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb1 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [policies] Evaluate -> DEBU 1fb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [cauthdsl] func1 -> DEBU 1fb5 0xc003ec9760 gate 1556789264340455500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [cauthdsl] func2 -> DEBU 1fb6 0xc003ec9760 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.341 UTC [cauthdsl] func2 -> DEBU 1fb7 0xc003ec9760 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb8 0xc003ec9760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb9 0xc003ec9760 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.343 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003ec9760 gate 1556789264340455500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.343 UTC [policies] Evaluate -> DEBU 1fbb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.344 UTC [policies] Evaluate -> DEBU 1fbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [policies] Evaluate -> DEBU 1fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func1 -> DEBU 1fbe 0xc003ec9fa0 gate 1556789264345678000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fbf 0xc003ec9fa0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc003ec9fa0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc1 0xc003ec9fa0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [msp.identity] Verify -> DEBU 1fc2 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fc3 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc003ec9fa0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [cauthdsl] func1 -> DEBU 1fc5 0xc003ec9fa0 gate 1556789264345678000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc8 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fca Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [msp.identity] Verify -> DEBU 1fcb Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcc Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcd Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc003edf6a0 gate 1556789264348256100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd2 0xc003edf6a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd3 0xc003edf6a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc003edf6a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd5 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd6 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd7 0xc003edf6a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd8 0xc003edf6a0 gate 1556789264348256100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdb Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fdd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fde Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [msp] DeserializeIdentity -> DEBU 1fdf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.350 UTC [msp.identity] Verify -> DEBU 1fe0 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e|
peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|"
peer0.org1.example.com | "2019-05-02 09:27:44.351 UTC [msp.identity] Verify -> DEBU 1fe1 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>|
peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\|
peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<|
peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.|
peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|"
peer0.org1.example.com | "2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fe4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.354 UTC [policies] Evaluate -> DEBU 1fe7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [cauthdsl] func1 -> DEBU 1fea 0xc003eef8d0 gate 1556789264355975300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1feb 0xc003eef8d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1fec 0xc003eef8d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fed 0xc003eef8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fee 0xc003eef8d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.358 UTC [cauthdsl] func1 -> DEBU 1fef 0xc003eef8d0 gate 1556789264355975300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.358 UTC [policies] Evaluate -> DEBU 1ff0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.359 UTC [policies] Evaluate -> DEBU 1ff1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.363 UTC [policies] Evaluate -> DEBU 1ff2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.365 UTC [cauthdsl] func1 -> DEBU 1ff3 0xc003f00110 gate 1556789264365401800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.366 UTC [cauthdsl] func2 -> DEBU 1ff4 0xc003f00110 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.367 UTC [cauthdsl] func2 -> DEBU 1ff5 0xc003f00110 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.369 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc003f00110 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff7 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.|
peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|"
peer0.org1.example.com | "2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX|
peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s|
peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.|
peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....|
peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|"
peer0.org1.example.com | "2019-05-02 09:27:44.371 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc003f00110 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.372 UTC [cauthdsl] func1 -> DEBU 1ffa 0xc003f00110 gate 1556789264365401800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffb Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffd Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.374 UTC [policies] Evaluate -> DEBU 1ffe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 1fff Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O|
peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|"
peer0.org1.example.com | "2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 2000 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.|
peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.|
peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.|
peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.|
peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|"
peer0.org1.example.com | "2019-05-02 09:27:44.376 UTC [msp] DeserializeIdentity -> DEBU 2001 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.377 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2003 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2004 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2005 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [policies] Evaluate -> DEBU 2006 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2007 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2008 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [cauthdsl] func1 -> DEBU 2009 0xc003f16000 gate 1556789264379774000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200a 0xc003f16000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200b 0xc003f16000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200c 0xc003f16000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [cauthdsl] func2 -> DEBU 200d 0xc003f16000 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [cauthdsl] func1 -> DEBU 200e 0xc003f16000 gate 1556789264379774000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [policies] Evaluate -> DEBU 200f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2010 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2011 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.383 UTC [cauthdsl] func1 -> DEBU 2012 0xc003f16840 gate 1556789264383020200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.383 UTC [cauthdsl] func2 -> DEBU 2013 0xc003f16840 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2014 0xc003f16840 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2015 0xc003f16840 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [msp.identity] Verify -> DEBU 2016 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.|
peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|"
peer0.org1.example.com | "2019-05-02 09:27:44.385 UTC [msp.identity] Verify -> DEBU 2017 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..|
peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.|
peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{|
peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.|
peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|"
peer0.org1.example.com | "2019-05-02 09:27:44.386 UTC [cauthdsl] func2 -> DEBU 2018 0xc003f16840 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.386 UTC [cauthdsl] func1 -> DEBU 2019 0xc003f16840 gate 1556789264383020200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [msp] DeserializeIdentity -> DEBU 201e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2020 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2024 0xc003f17920 gate 1556789264388240100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2025 0xc003f17920 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2026 0xc003f17920 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2027 0xc003f17920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2028 0xc003f17920 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2029 0xc003f17920 gate 1556789264388240100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 202d 0xc003f28160 gate 1556789264388604600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202e 0xc003f28160 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202f 0xc003f28160 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2030 0xc003f28160 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2031 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.|
peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2032 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..|
peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.|
peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{|
peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.|
peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2033 0xc003f28160 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2034 0xc003f28160 gate 1556789264388604600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2037 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 2039 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203b Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..|
peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203c Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@|
peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.|
peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..|
peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.|
peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp] DeserializeIdentity -> DEBU 203d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.508 UTC [gossip.gossip] handleMessage -> DEBU 203f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.510 UTC [msp] DeserializeIdentity -> DEBU 2040 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.512 UTC [msp] DeserializeIdentity -> DEBU 2041 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.514 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.533 UTC [gossip.gossip] handleMessage -> DEBU 2043 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2044 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2045 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:44.535 UTC [gossip.gossip] handleMessage -> DEBU 2046 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.538 UTC [gossip.comm] func1 -> DEBU 2047 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.539 UTC [gossip.gossip] handleMessage -> DEBU 2048 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.542 UTC [msp.identity] Verify -> DEBU 2049 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:44.543 UTC [msp.identity] Verify -> DEBU 204a Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:44.545 UTC [msp] DeserializeIdentity -> DEBU 204b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.546 UTC [gossip.gossip] handleMessage -> DEBU 204c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.547 UTC [gossip.gossip] handleMessage -> DEBU 204d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.550 UTC [msp.identity] Verify -> DEBU 204e Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:44.554 UTC [msp.identity] Verify -> DEBU 204f Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:44.555 UTC [msp] DeserializeIdentity -> DEBU 2050 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.557 UTC [gossip.gossip] handleMessage -> DEBU 2051 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.558 UTC [gossip.gossip] handleMessage -> DEBU 2052 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15369703408594673684 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.558 UTC [gossip.pull] HandleMessage -> DEBU 2053 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15369703408594673684 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.559 UTC [gossip.pull] SendDigest -> DEBU 2054 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:44.559 UTC [gossip.gossip] handleMessage -> DEBU 2055 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.597 UTC [endorser] ProcessProposal -> DEBU 2056 Entering: request from 172.18.0.8:57342"
peer0.org1.example.com | "2019-05-02 09:27:44.598 UTC [protoutils] ValidateProposalMessage -> DEBU 2057 ValidateProposalMessage starts for signed proposal 0xc003f0f4f0"
peer0.org1.example.com | "2019-05-02 09:27:44.598 UTC [protoutils] validateChannelHeader -> DEBU 2058 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:44.599 UTC [protoutils] checkSignatureFromCreator -> DEBU 2059 begin"
peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [msp] GetManagerForChain -> DEBU 205a Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205c creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5|
peer0.org1.example.com | 00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|"
peer0.org1.example.com | "2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....|
peer0.org1.example.com | 00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..|
peer0.org1.example.com | 00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..|
peer0.org1.example.com | 00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.|
peer0.org1.example.com | 00000040 d0 d4 38 fb 65 8a e4 |..8.e..|"
peer0.org1.example.com | "2019-05-02 09:27:44.602 UTC [protoutils] checkSignatureFromCreator -> DEBU 205f exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2060 validateChaincodeProposalMessage starts for proposal 0xc003169880, header 0xc003f0f900"
peer0.org1.example.com | "2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2061 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.604 UTC [endorser] preProcess -> DEBU 2062 [businesschannel][6275b52f] processing txid: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194"
peer0.org1.example.com | "2019-05-02 09:27:44.604 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2063 retrieveTransactionByID() - txId = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]"
peer0.org1.example.com | "2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2064 acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2065 acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2066 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2067 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2068 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func1 -> DEBU 2069 0xc003faa430 gate 1556789264607014800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206a 0xc003faa430 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206b 0xc003faa430 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206c 0xc003faa430 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5|
peer0.org1.example.com | 00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|"
peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....|
peer0.org1.example.com | 00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..|
peer0.org1.example.com | 00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..|
peer0.org1.example.com | 00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.|
peer0.org1.example.com | 00000040 d0 d4 38 fb 65 8a e4 |..8.e..|"
peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [cauthdsl] func2 -> DEBU 206f 0xc003faa430 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [cauthdsl] func1 -> DEBU 2070 0xc003faa430 gate 1556789264607014800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2071 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2072 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.609 UTC [policies] Evaluate -> DEBU 2073 Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.610 UTC [policies] Evaluate -> DEBU 2074 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2075 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2076 constructing new tx simulator txid = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [endorser] SimulateProposal -> DEBU 2077 [businesschannel][6275b52f] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 2078 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [endorser] callChaincode -> INFO 2079 [businesschannel][6275b52f] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207b GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [chaincode] Execute -> DEBU 207c Entry"
peer0.org1.example.com | "2019-05-02 09:27:44.614 UTC [chaincode] handleMessage -> DEBU 207d [6275b52f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.614 UTC [chaincode] HandleTransaction -> DEBU 207e [6275b52f] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:44.615 UTC [chaincode] HandleGetState -> DEBU 207f [6275b52f] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:44.616 UTC [stateleveldb] GetState -> DEBU 2080 GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:44.616 UTC [chaincode] HandleTransaction -> DEBU 2081 [6275b52f] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] handleMessage -> DEBU 2082 [6275b52f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] Notify -> DEBU 2083 [6275b52f] notifying Txid:6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] Execute -> DEBU 2084 Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] callChaincode -> INFO 2085 [businesschannel][6275b52f] Exit chaincode: name:"exp02" (8ms)"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2086 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] Done -> DEBU 2087 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] SimulateProposal -> DEBU 2088 [businesschannel][6275b52f] Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 2089 [businesschannel][6275b52f] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 208a [businesschannel][6275b52f] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] EndorseWithPlugin -> DEBU 208b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208c Sign: plaintext: 0A2016C9E5582572B616B57E921F3163...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208d Sign: digest: B643F95F5B181D7978F3F4783F2442A823828DD53166EBEC9053658240DCBA96 "
peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] EndorseWithPlugin -> DEBU 208e Exiting {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] endorseProposal -> DEBU 208f [businesschannel][6275b52f] Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [lockbasedtxmgr] Done -> DEBU 2090 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]"
peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] func1 -> DEBU 2091 Exit: request from 172.18.0.8:57342"
peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [comm.grpc.server] 1 -> INFO 2092 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57342 grpc.code=OK grpc.call_duration=23.2448ms
peer0.org1.example.com | "2019-05-02 09:27:44.626 UTC [grpc] infof -> DEBU 2093 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:44.628 UTC [grpc] infof -> DEBU 2094 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2095 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2096 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2097 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2098 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2099 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.758 UTC [gossip.gossip] handleMessage -> DEBU 209a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [msp] DeserializeIdentity -> DEBU 209b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 209c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 209f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a2 0xc003fc1da0 gate 1556789264760273600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a3 0xc003fc1da0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a4 0xc003fc1da0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a5 0xc003fc1da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a6 0xc003fc1da0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a7 0xc003fc1da0 gate 1556789264760273600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20ab 0xc003fd85e0 gate 1556789264760892200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ac 0xc003fd85e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ad 0xc003fd85e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ae 0xc003fd85e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20af Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20b0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20b1 0xc003fd85e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20b2 0xc003fd85e0 gate 1556789264760892200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [msp] DeserializeIdentity -> DEBU 20b7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [gossip.gossip] handleMessage -> DEBU 20b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.778 UTC [gossip.comm] func1 -> DEBU 20b9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.779 UTC [gossip.gossip] handleMessage -> DEBU 20ba Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.779 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20bd Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20be Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [policies] Evaluate -> DEBU 20bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func1 -> DEBU 20c2 0xc003fb9500 gate 1556789264782028100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c3 0xc003fb9500 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c4 0xc003fb9500 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c5 0xc003fb9500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c6 0xc003fb9500 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [cauthdsl] func1 -> DEBU 20c7 0xc003fb9500 gate 1556789264782028100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [policies] Evaluate -> DEBU 20ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [cauthdsl] func1 -> DEBU 20cb 0xc003fb9d40 gate 1556789264785304500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [cauthdsl] func2 -> DEBU 20cc 0xc003fb9d40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20cd 0xc003fb9d40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20ce 0xc003fb9d40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20cf Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20d0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:44.788 UTC [cauthdsl] func2 -> DEBU 20d1 0xc003fb9d40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.789 UTC [cauthdsl] func1 -> DEBU 20d2 0xc003fb9d40 gate 1556789264785304500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.792 UTC [msp] DeserializeIdentity -> DEBU 20d7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.792 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.809 UTC [gossip.comm] func1 -> DEBU 20d9 Got message: GossipMessage: tag:EMPTY hello:<nonce:14567756687626642715 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.810 UTC [gossip.gossip] handleMessage -> DEBU 20da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14567756687626642715 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.811 UTC [gossip.pull] HandleMessage -> DEBU 20db GossipMessage: tag:EMPTY hello:<nonce:14567756687626642715 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.812 UTC [msp] DeserializeIdentity -> DEBU 20dc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20dd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20de Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.816 UTC [msp] DeserializeIdentity -> DEBU 20df Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.820 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.821 UTC [msp] DeserializeIdentity -> DEBU 20e1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.822 UTC [gossip.pull] SendDigest -> DEBU 20e2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:44.828 UTC [gossip.gossip] handleMessage -> DEBU 20e3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.comm] func1 -> DEBU 20e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20e8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [msp] DeserializeIdentity -> DEBU 20e9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20eb Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20ec Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.833 UTC [cauthdsl] func1 -> DEBU 20f0 0xc00400a640 gate 1556789264833723500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f1 0xc00400a640 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f2 0xc00400a640 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f3 0xc00400a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f4 0xc00400a640 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.835 UTC [cauthdsl] func1 -> DEBU 20f5 0xc00400a640 gate 1556789264833723500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:44.835 UTC [policies] Evaluate -> DEBU 20f6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:44.837 UTC [cauthdsl] func1 -> DEBU 20f9 0xc00400ae80 gate 1556789264837180600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.837 UTC [cauthdsl] func2 -> DEBU 20fa 0xc00400ae80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fb 0xc00400ae80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fc 0xc00400ae80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fd Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.|
peer0.org1.example.com | 00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|"
peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fe Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD|
peer0.org1.example.com | 00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....|
peer0.org1.example.com | 00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a|
peer0.org1.example.com | 00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m||
peer0.org1.example.com | 00000040 45 0c aa 29 2f 38 |E..)/8|"
peer0.org1.example.com | "2019-05-02 09:27:44.839 UTC [cauthdsl] func2 -> DEBU 20ff 0xc00400ae80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [cauthdsl] func1 -> DEBU 2100 0xc00400ae80 gate 1556789264837180600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2101 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2102 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2103 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.841 UTC [policies] Evaluate -> DEBU 2104 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:44.842 UTC [gossip.discovery] handleAliveMessage -> DEBU 2105 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2106 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2107 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2108 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2109 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:44.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 210a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 210b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 210c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.848 UTC [gossip.discovery] sendMemResponse -> DEBU 210d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:44.851 UTC [msp] DeserializeIdentity -> DEBU 210e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.855 UTC [msp] DeserializeIdentity -> DEBU 210f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.859 UTC [msp] DeserializeIdentity -> DEBU 2110 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.861 UTC [gossip.comm] Send -> DEBU 2111 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.862 UTC [gossip.discovery] sendMemResponse -> DEBU 2112 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2113 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2114 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [endorser] ProcessProposal -> DEBU 2115 Entering: request from 172.18.0.8:57346"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] ValidateProposalMessage -> DEBU 2116 ValidateProposalMessage starts for signed proposal 0xc003ff6a50"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] validateChannelHeader -> DEBU 2117 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 2118 begin"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp] GetManagerForChain -> DEBU 2119 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211b creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......|
peer0.org1.example.com | 00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|"
peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m|
peer0.org1.example.com | 00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...|
peer0.org1.example.com | 00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.|
peer0.org1.example.com | 00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........|
peer0.org1.example.com | 00000040 ca 33 35 5c 97 9c |.35\..|"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 211e exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 211f validateChaincodeProposalMessage starts for proposal 0xc0034600e0, header 0xc003ff6e60"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2120 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [endorser] preProcess -> DEBU 2121 [businesschannel][91a569c2] processing txid: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2122 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2123 acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2124 acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2125 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2126 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2127 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func1 -> DEBU 2128 0xc00406f0c0 gate 1556789264936683300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 2129 0xc00406f0c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212a 0xc00406f0c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212b 0xc00406f0c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......|
peer0.org1.example.com | 00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|"
peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m|
peer0.org1.example.com | 00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...|
peer0.org1.example.com | 00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.|
peer0.org1.example.com | 00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........|
peer0.org1.example.com | 00000040 ca 33 35 5c 97 9c |.35\..|"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [cauthdsl] func2 -> DEBU 212e 0xc00406f0c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [cauthdsl] func1 -> DEBU 212f 0xc00406f0c0 gate 1556789264936683300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2130 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2131 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2132 Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2133 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2134 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2135 constructing new tx simulator txid = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [endorser] SimulateProposal -> DEBU 2136 [businesschannel][91a569c2] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2137 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [endorser] callChaincode -> INFO 2138 [businesschannel][91a569c2] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2139 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 213a GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:44.938 UTC [chaincode] Execute -> DEBU 213b Entry"
peer0.org1.example.com | "2019-05-02 09:27:44.940 UTC [chaincode] handleMessage -> DEBU 213c [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 213d [91a569c2] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleGetState -> DEBU 213e [91a569c2] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [stateleveldb] GetState -> DEBU 213f GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 2140 [91a569c2] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:44.944 UTC [chaincode] handleMessage -> DEBU 2141 [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.944 UTC [chaincode] HandleTransaction -> DEBU 2142 [91a569c2] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [chaincode] HandleGetState -> DEBU 2143 [91a569c2] getting state for chaincode exp02, key b, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [stateleveldb] GetState -> DEBU 2144 GetState(). ns=exp02, key=b"
peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [chaincode] HandleTransaction -> DEBU 2145 [91a569c2] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] handleMessage -> DEBU 2146 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2147 [91a569c2] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2148 [91a569c2] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:44.947 UTC [chaincode] handleMessage -> DEBU 2149 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214a [91a569c2] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214b [91a569c2] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] handleMessage -> DEBU 214c [91a569c2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] Notify -> DEBU 214d [91a569c2] notifying Txid:91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] Execute -> DEBU 214e Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] callChaincode -> INFO 214f [businesschannel][91a569c2] Exit chaincode: name:"exp02" (16ms)"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2150 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 2151 Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] SimulateProposal -> DEBU 2152 [businesschannel][91a569c2] Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2153 [businesschannel][91a569c2] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2154 [businesschannel][91a569c2] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2155 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2156 Sign: plaintext: 0A20908C75852A885565668F0D75711B...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2157 Sign: digest: 9AC01AB8D461550F6863AE2639A725BB3AE3FB9D572FCF35921F0C195B81F48D "
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2158 Exiting {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2159 [businesschannel][91a569c2] Exit"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 215a Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] func1 -> DEBU 215b Exit: request from 172.18.0.8:57346"
peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [comm.grpc.server] 1 -> INFO 215c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57346 grpc.code=OK grpc.call_duration=19.9116ms
peer0.org1.example.com | "2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU 215d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:44.964 UTC [grpc] infof -> DEBU 215e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [gossip.comm] func1 -> DEBU 215f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [gossip.gossip] handleMessage -> DEBU 2160 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2161 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2162 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2163 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.983 UTC [gossip.gossip] handleMessage -> DEBU 2164 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2165 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2166 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [gossip.pull] Hello -> DEBU 2167 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2168 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2169 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] Send -> DEBU 216a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18006043574656057052 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18006043574656057052 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.987 UTC [gossip.gossip] handleMessage -> DEBU 216d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.988 UTC [gossip.pull] HandleMessage -> DEBU 216e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.990 UTC [gossip.gossip] handleMessage -> DEBU 216f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:44.991 UTC [gossip.comm] func1 -> DEBU 2170 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.998 UTC [gossip.gossip] handleMessage -> DEBU 2171 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:44.999 UTC [msp] DeserializeIdentity -> DEBU 2172 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:44.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2173 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2174 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2175 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [policies] Evaluate -> DEBU 2176 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2177 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2178 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func1 -> DEBU 2179 0xc0040ba360 gate 1556789265002127200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217a 0xc0040ba360 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217b 0xc0040ba360 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217c 0xc0040ba360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217d 0xc0040ba360 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.004 UTC [cauthdsl] func1 -> DEBU 217e 0xc0040ba360 gate 1556789265002127200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.004 UTC [policies] Evaluate -> DEBU 217f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.005 UTC [policies] Evaluate -> DEBU 2180 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.006 UTC [policies] Evaluate -> DEBU 2181 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.006 UTC [cauthdsl] func1 -> DEBU 2182 0xc0040baba0 gate 1556789265006776800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.007 UTC [cauthdsl] func2 -> DEBU 2183 0xc0040baba0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.009 UTC [cauthdsl] func2 -> DEBU 2184 0xc0040baba0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.010 UTC [cauthdsl] func2 -> DEBU 2185 0xc0040baba0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2186 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.|
peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|"
peer0.org1.example.com | "2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2187 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..|
peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.|
peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{|
peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.|
peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|"
peer0.org1.example.com | "2019-05-02 09:27:45.014 UTC [cauthdsl] func2 -> DEBU 2188 0xc0040baba0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.015 UTC [cauthdsl] func1 -> DEBU 2189 0xc0040baba0 gate 1556789265006776800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:45.015 UTC [policies] Evaluate -> DEBU 218a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.021 UTC [policies] Evaluate -> DEBU 218d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.021 UTC [msp] DeserializeIdentity -> DEBU 218e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.022 UTC [gossip.gossip] handleMessage -> DEBU 218f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2190 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2191 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13881127896331448771 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2192 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2193 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7026397414490242265 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2194 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2195 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2785192085220839402 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2785192085220839402 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2197 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2198 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13881127896331448771 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2199 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7026397414490242265 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.092 UTC [gossip.gossip] handleMessage -> DEBU 219c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.093 UTC [gossip.pull] HandleMessage -> DEBU 219d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.093 UTC [gossip.gossip] handleMessage -> DEBU 219e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.094 UTC [gossip.gossip] handleMessage -> DEBU 219f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3098192613935936681 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a3 GossipMessage: tag:EMPTY hello:<nonce:3098192613935936681 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] SendDigest -> DEBU 21a4 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.099 UTC [gossip.comm] func1 -> DEBU 21a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.099 UTC [gossip.gossip] handleMessage -> DEBU 21a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.100 UTC [gossip.pull] HandleMessage -> DEBU 21a8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.100 UTC [gossip.gossip] handleMessage -> DEBU 21a9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21aa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21ab Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [msp.identity] Verify -> DEBU 21ae Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..|
peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|"
peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21af Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.|
peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.|
peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.|
peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.|
peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|"
peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b1 Verify: sig = 00000000 30 45 02 21 00 a5 25 fe 94 c7 0d 11 eb ed 47 49 |0E.!..%.......GI|
peer0.org1.example.com | 00000010 88 ca a1 4f 27 aa fe 7d 11 2a 5f 1c d9 36 23 06 |...O'..}.*_..6#.|
peer0.org1.example.com | 00000020 e5 71 3c 79 30 02 20 36 75 18 6b 49 65 24 5b 60 |.q<y0. 6u.kIe$[`|
peer0.org1.example.com | 00000030 48 64 80 4b a3 74 3f 54 b1 85 bc 8b cc f4 62 38 |Hd.K.t?T......b8|
peer0.org1.example.com | 00000040 56 6d b3 d4 a7 0f 39 |Vm....9|"
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.109 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21b9 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] Send -> DEBU 21bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21bd Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21bf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101A "
peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c2 Sign: digest: 7CB586E87BFDA30C828413BD4F6FDC5D74552CD642416B1977CDB79AE5A10AD0 "
peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [gossip.comm] Send -> DEBU 21c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.120 UTC [gossip.gossip] handleMessage -> DEBU 21d0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.121 UTC [gossip.gossip] handleMessage -> DEBU 21d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.121 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [msp] DeserializeIdentity -> DEBU 21d4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [cauthdsl] func1 -> DEBU 21db 0xc0041148c0 gate 1556789265122938500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dc 0xc0041148c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dd 0xc0041148c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21de 0xc0041148c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21df 0xc0041148c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e0 0xc0041148c0 gate 1556789265122938500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e4 0xc004115100 gate 1556789265123536700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e5 0xc004115100 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e6 0xc004115100 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e7 0xc004115100 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e8 Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.|
peer0.org1.example.com | 00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|"
peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e9 Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD|
peer0.org1.example.com | 00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....|
peer0.org1.example.com | 00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a|
peer0.org1.example.com | 00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m||
peer0.org1.example.com | 00000040 45 0c aa 29 2f 38 |E..)/8|"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [cauthdsl] func2 -> DEBU 21ea 0xc004115100 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [cauthdsl] func1 -> DEBU 21eb 0xc004115100 gate 1556789265123536700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ee Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [msp.identity] Verify -> DEBU 21f3 Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..|
peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|"
peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f4 Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.|
peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.|
peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.|
peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.|
peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|"
peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f8 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]|
peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|"
peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [msp.identity] Verify -> DEBU 21f9 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.|
peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:|
peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.|
peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.|
peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|"
peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] isSentByMe -> DEBU 21fb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21fd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.comm] func1 -> DEBU 21fe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 21ff Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 2200 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2201 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.138 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2202 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.139 UTC [gossip.gossip] handleMessage -> DEBU 2203 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.138 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]|
peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|"
peer0.org1.example.com | "2019-05-02 09:27:45.139 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.|
peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:|
peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.|
peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.|
peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|"
peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2206 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] isSentByMe -> DEBU 2207 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2208 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2209 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220a Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..|
peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|"
peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220b Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.|
peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.|
peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.|
peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.|
peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|"
peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2210 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.gossip] handleMessage -> DEBU 2211 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [msp.identity] Verify -> DEBU 2212 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]|
peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|"
peer0.org1.example.com | "2019-05-02 09:27:45.143 UTC [msp.identity] Verify -> DEBU 2213 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.|
peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:|
peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.|
peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.|
peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|"
peer0.org1.example.com | "2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2214 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2215 Verify: sig = 00000000 30 45 02 21 00 88 e8 c9 ee a7 1d 17 02 22 75 77 |0E.!........."uw|
peer0.org1.example.com | 00000010 61 24 48 be 3f ab d6 25 c1 0f c2 b6 fb 5c ab d6 |a$H.?..%.....\..|
peer0.org1.example.com | 00000020 40 4d 99 b4 e1 02 20 50 0f b6 9f 16 0d 04 a3 49 |@M.... P.......I|
peer0.org1.example.com | 00000030 dd 0d 3c 95 76 01 6f d7 ac 6f d3 fa 1e 48 f6 52 |..<.v.o..o...H.R|
peer0.org1.example.com | 00000040 47 10 65 6d 9e cb 0f |G.em...|"
peer0.org1.example.com | "2019-05-02 09:27:45.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 2216 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.145 UTC [gossip.discovery] isSentByMe -> DEBU 2217 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.146 UTC [gossip.discovery] handleAliveMessage -> DEBU 2218 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2219 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.163 UTC [gossip.gossip] handleMessage -> DEBU 221a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:8377240027019268622 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.163 UTC [gossip.pull] HandleMessage -> DEBU 221b GossipMessage: tag:EMPTY hello:<nonce:8377240027019268622 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2220 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2221 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.165 UTC [gossip.pull] SendDigest -> DEBU 2222 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:45.165 UTC [gossip.gossip] handleMessage -> DEBU 2223 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2224 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2225 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2226 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2227 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [msp] DeserializeIdentity -> DEBU 2228 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2229 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func1 -> DEBU 222f 0xc00416ae50 gate 1556789265173787200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2230 0xc00416ae50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2231 0xc00416ae50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2232 0xc00416ae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2233 0xc00416ae50 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2234 0xc00416ae50 gate 1556789265173787200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2235 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2236 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2237 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2238 0xc00416b690 gate 1556789265174471200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2239 0xc00416b690 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223a 0xc00416b690 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223b 0xc00416b690 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223c Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o|
peer0.org1.example.com | 00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|"
peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223d Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{|
peer0.org1.example.com | 00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U|
peer0.org1.example.com | 00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....|
peer0.org1.example.com | 00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...|
peer0.org1.example.com | 00000040 9c 37 68 e1 92 b4 |.7h...|"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [cauthdsl] func2 -> DEBU 223e 0xc00416b690 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [cauthdsl] func1 -> DEBU 223f 0xc00416b690 gate 1556789265174471200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2240 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2241 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2242 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2243 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2244 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2245 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2246 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2247 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 "
peer0.org1.example.com | "2019-05-02 09:27:45.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 2248 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:45.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 2249 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 224b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.186 UTC [gossip.discovery] sendMemResponse -> DEBU 224c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.188 UTC [msp] DeserializeIdentity -> DEBU 224f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.comm] Send -> DEBU 2250 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.discovery] sendMemResponse -> DEBU 2251 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2252 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:45.194 UTC [gossip.comm] sendToEndpoint -> DEBU 2253 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [endorser] ProcessProposal -> DEBU 2254 Entering: request from 172.18.0.8:57352"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] ValidateProposalMessage -> DEBU 2255 ValidateProposalMessage starts for signed proposal 0xc004137e50"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] validateChannelHeader -> DEBU 2256 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2257 begin"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp] GetManagerForChain -> DEBU 2258 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2259 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225a creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225b Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.|
peer0.org1.example.com | 00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225c Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..|
peer0.org1.example.com | 00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a|
peer0.org1.example.com | 00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.|
peer0.org1.example.com | 00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?|
peer0.org1.example.com | 00000040 28 5d 38 9f c0 5e 09 |(]8..^.|"
peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225d exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225e validateChaincodeProposalMessage starts for proposal 0xc00335c0e0, header 0xc0041d8280"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225f validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [endorser] preProcess -> DEBU 2260 [businesschannel][de605872] processing txid: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2261 retrieveTransactionByID() - txId = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2262 acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2263 acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2264 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2265 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2266 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 2267 0xc0041f02c0 gate 1556789265323656200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2268 0xc0041f02c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2269 0xc0041f02c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226a 0xc0041f02c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226b 0xc0041f02c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 226c 0xc0041f02c0 gate 1556789265323656200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226d Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func1 -> DEBU 2270 0xc0041f0b20 gate 1556789265324623400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2271 0xc0041f0b20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2272 0xc0041f0b20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2273 Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [msp] Validate -> DEBU 2274 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [msp] getCertificationChain -> DEBU 2275 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [cauthdsl] func2 -> DEBU 2276 0xc0041f0b20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.|
peer0.org1.example.com | 00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|"
peer0.org1.example.com | "2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..|
peer0.org1.example.com | 00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a|
peer0.org1.example.com | 00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.|
peer0.org1.example.com | 00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?|
peer0.org1.example.com | 00000040 28 5d 38 9f c0 5e 09 |(]8..^.|"
peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [cauthdsl] func2 -> DEBU 2279 0xc0041f0b20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [cauthdsl] func1 -> DEBU 227a 0xc0041f0b20 gate 1556789265324623400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 227f constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2280 constructing new tx simulator txid = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]"
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [endorser] SimulateProposal -> DEBU 2281 [businesschannel][de605872] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [stateleveldb] GetState -> DEBU 2282 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [endorser] callChaincode -> INFO 2283 [businesschannel][de605872] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2284 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2285 GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [chaincode] Execute -> DEBU 2286 Entry"
peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] handleMessage -> DEBU 2287 [de605872] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 2288 [de605872] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleGetState -> DEBU 2289 [de605872] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [stateleveldb] GetState -> DEBU 228a GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 228b [de605872] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:45.331 UTC [chaincode] handleMessage -> DEBU 228c [de605872] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:45.331 UTC [chaincode] Notify -> DEBU 228d [de605872] notifying Txid:de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [chaincode] Execute -> DEBU 228e Exit"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] callChaincode -> INFO 228f [businesschannel][de605872] Exit chaincode: name:"exp02" (3ms)"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2290 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] Done -> DEBU 2291 Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] SimulateProposal -> DEBU 2292 [businesschannel][de605872] Exit"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2293 [businesschannel][de605872] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2294 [businesschannel][de605872] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] EndorseWithPlugin -> DEBU 2295 Entering endorsement for {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2296 Sign: plaintext: 0A20F6C623970F9D58181ED63FB6D75F...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2297 Sign: digest: 5A0D03AB58C36305ECE64C8543B56F4EE8D1F3FA8EC3D88057007C7E511C498B "
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] EndorseWithPlugin -> DEBU 2298 Exiting {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] endorseProposal -> DEBU 2299 [businesschannel][de605872] Exit"
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [lockbasedtxmgr] Done -> DEBU 229a Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]"
peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] func1 -> DEBU 229b Exit: request from 172.18.0.8:57352"
peer0.org1.example.com | "2019-05-02 09:27:45.334 UTC [comm.grpc.server] 1 -> INFO 229c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57352 grpc.code=OK grpc.call_duration=12.1359ms
peer0.org1.example.com | "2019-05-02 09:27:45.337 UTC [grpc] infof -> DEBU 229d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:45.338 UTC [grpc] infof -> DEBU 229e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 229f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22a0 Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:46.986 UTC [policies] Evaluate -> DEBU 22a3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:46.986 UTC [cauthdsl] func1 -> DEBU 22a4 0xc0041574d0 gate 1556789266986610200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a5 0xc0041574d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a6 0xc0041574d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a7 0xc0041574d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a8 Verify: digest = 00000000 d3 92 47 e6 d2 77 f0 f0 95 28 55 b9 1c 06 0b c5 |..G..w...(U.....|
peer0.org1.example.com | 00000010 f5 f3 0a 60 cb c3 a5 20 28 b7 13 7a 99 ca e9 73 |...`... (..z...s|"
peer0.org1.example.com | "2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a9 Verify: sig = 00000000 30 45 02 21 00 dd 9a 7a e4 73 fb d3 1b 2e 48 0e |0E.!...z.s....H.|
peer0.org1.example.com | 00000010 37 5a f8 37 28 97 67 32 cd 69 d8 31 90 8d df db |7Z.7(.g2.i.1....|
peer0.org1.example.com | 00000020 f0 de 69 e0 48 02 20 31 e7 d6 c6 97 ec d9 18 53 |..i.H. 1.......S|
peer0.org1.example.com | 00000030 0f 3f d6 b5 2a e3 61 70 a6 bd 80 93 27 3b 0e 6a |.?..*.ap....';.j|
peer0.org1.example.com | 00000040 12 3e 55 9f 88 ea 41 |.>U...A|"
peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [cauthdsl] func2 -> DEBU 22aa 0xc0041574d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [cauthdsl] func1 -> DEBU 22ab 0xc0041574d0 gate 1556789266986610200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ac Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ad == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22ae Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:46.991 UTC [blocksProvider] DeliverBlocks -> DEBU 22b0 [businesschannel] Adding payload to local buffer, blockNum = [7]"
peer0.org1.example.com | "2019-05-02 09:27:46.991 UTC [gossip.state] addPayload -> DEBU 22b1 [businesschannel] Adding payload to local buffer, blockNum = [7]"
peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b2 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]"
peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b3 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> INFO 22b4 [businesschannel] Received block [7] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> DEBU 22b5 [businesschannel] Validating block [7]"
peer0.org1.example.com | "2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b6 [businesschannel] START Block Validation for block [7]"
peer0.org1.example.com | "2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b7 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [committer.txvalidator] validateTx -> DEBU 22b8 [businesschannel] validateTx starts for block 0xc0041d29c0 env 0xc0041d90e0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22b9 ValidateTransactionEnvelope starts for envelope 0xc0041d90e0"
peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22ba Header is channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" "
peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [protoutils] validateChannelHeader -> DEBU 22bb validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bc begin"
peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [msp] GetManagerForChain -> DEBU 22bd Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22be creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bf creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [msp.identity] Verify -> DEBU 22c0 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.|
peer0.org1.example.com | 00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [msp.identity] Verify -> DEBU 22c1 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb|
peer0.org1.example.com | 00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...|
peer0.org1.example.com | 00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...|
peer0.org1.example.com | 00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....|
peer0.org1.example.com | 00000040 fe 64 c2 00 aa 35 b0 |.d...5.|"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 22c2 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c3 validateEndorserTransaction starts for data 0xc00402f800, header channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" "
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c4 validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c5 validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] ValidateTransaction -> DEBU 22c6 ValidateTransactionEnvelope returns err %!s(<nil>)"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c7 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 22c8 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c9 Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] Dispatch -> DEBU 22ca [businesschannel] Dispatch starts for bytes 0xc004213800"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22cb constructing new query executor txid = [5714fa25-243e-4135-82b2-fe9a41defd5b]"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cc GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22ce GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo"
peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22d0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d1 Done with transaction simulation / query execution [5714fa25-243e-4135-82b2-fe9a41defd5b]"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 22d2 Validating Tx 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22d3 constructing new query executor txid = [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d4 Done with transaction simulation / query execution [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22d5 0xc004223eb0 gate 1556789266998451400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d6 0xc004223eb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d7 0xc004223eb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d8 0xc004223eb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22d9 Verify: digest = 00000000 9a c0 1a b8 d4 61 55 0f 68 63 ae 26 39 a7 25 bb |.....aU.hc.&9.%.|
peer0.org1.example.com | 00000010 3a e3 fb 9d 57 2f cf 35 92 1f 0c 19 5b 81 f4 8d |:...W/.5....[...|"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22da Verify: sig = 00000000 30 44 02 20 5a 55 d1 09 16 cf f3 36 7f 98 0c ff |0D. ZU.....6....|
peer0.org1.example.com | 00000010 af a2 95 09 ac be d0 3c cd f4 cb 98 2c 09 83 83 |.......<....,...|
peer0.org1.example.com | 00000020 5a 28 70 2f 02 20 74 cc 5c 69 b5 90 20 ba b8 b7 |Z(p/. t.\i.. ...|
peer0.org1.example.com | 00000030 6f 04 bb f6 31 b1 78 ed 2c d0 75 b9 8d de d7 e7 |o...1.x.,.u.....|
peer0.org1.example.com | 00000040 24 f4 b0 c4 23 eb |$...#.|"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22db 0xc004223eb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dc 0xc004223eb0 signed by 1 principal evaluation starts (used [true])"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dd 0xc004223eb0 skipping identity 0 because it has already been used"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22de 0xc004223eb0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22df 0xc004223eb0 gate 1556789266998451400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22e0 constructing new query executor txid = [6d2656e0-315f-4b33-ac46-c67014f3b812]"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] Done -> DEBU 22e1 Done with transaction simulation / query execution [6d2656e0-315f-4b33-ac46-c67014f3b812]"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [vscc] Validate -> DEBU 22e2 block 7, namespace: exp02, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 22e3 Transaction 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Dispatch -> DEBU 22e4 [businesschannel] Dispatch completes env bytes 0xc004213800"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] validateTx -> DEBU 22e5 [businesschannel] validateTx completes for block 0xc0041d29c0 env 0xc0041d90e0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> DEBU 22e6 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> INFO 22e7 [businesschannel] Validated block [7] in 6ms"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [gossip.privdata] listMissingPrivateData -> DEBU 22e8 Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [gossip.privdata] StoreBlock -> DEBU 22e9 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:47.001 UTC [gossip.state] addPayload -> DEBU 22ea Blocks payloads buffer size for channel [businesschannel] is 0 blocks"
peer0.org1.example.com | "2019-05-02 09:27:47.001 UTC [blocksProvider] DeliverBlocks -> DEBU 22eb [businesschannel] Gossiping block [7], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [gossip.channel] AddToMsgStore -> DEBU 22ec Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [gossip.pull] Add -> DEBU 22ee Added 7, total items: 7"
peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [kvledger] CommitWithPvtData -> DEBU 22ed [businesschannel] Validating state for block [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22ef Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f0 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f1 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f2 ValidateAndPrepareBatch() for block number = [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f3 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [valimpl] preprocessProtoBlock -> DEBU 22f4 txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [stateleveldb] GetState -> DEBU 22f5 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f6 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [stateleveldb] GetState -> DEBU 22f7 GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f8 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22f9 GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fa Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22fb GetState(). ns=exp02, key=b"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fc Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 22fd Block [7] Transaction index [0] TxId [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] marked as valid by state validator. ContainsPostOrderWrites [false]"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valinternal] ApplyWriteSet -> DEBU 22fe txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00407d9c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00407da00)}"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22ff validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2300 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2301 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [kvledger] CommitWithPvtData -> DEBU 2302 [businesschannel] Committing block [7] to storage"
peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2303 Writing block [7] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:47.007 UTC [msp] DeserializeIdentity -> DEBU 2304 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.008 UTC [msp] DeserializeIdentity -> DEBU 2305 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2306 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2307 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] Send -> DEBU 2308 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2309 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 230a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [msp] DeserializeIdentity -> DEBU 230b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.017 UTC [msp] DeserializeIdentity -> DEBU 230c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.017 UTC [pvtdatastorage] Prepare -> DEBU 230d Saved 0 private data write sets for block [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.020 UTC [fsblkstorage] indexBlock -> DEBU 230e Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets=
peer0.org1.example.com | txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 230f Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 2310 Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx number:[0] ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:47.025 UTC [fsblkstorage] updateCheckpoint -> DEBU 2311 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94622], isChainEmpty=[false], lastBlockNumber=[7]"
peer0.org1.example.com | "2019-05-02 09:27:47.026 UTC [pvtdatastorage] Commit -> DEBU 2312 Committing private data for block [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.029 UTC [pvtdatastorage] Commit -> DEBU 2313 Committed private data for block [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.030 UTC [kvledger] CommitWithPvtData -> DEBU 2314 [businesschannel] Committing block [7] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:47.030 UTC [lockbasedtxmgr] Commit -> DEBU 2315 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:47.031 UTC [lockbasedtxmgr] Commit -> DEBU 2316 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:47.032 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2317 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:47.032 UTC [lockbasedtxmgr] Commit -> DEBU 2318 Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 2319 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]"
peer0.org1.example.com | "2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 231a Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]"
peer0.org1.example.com | "2019-05-02 09:27:47.035 UTC [lockbasedtxmgr] Commit -> DEBU 231b Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231c Preparing potential purge list working-set for expiringAtBlk [8]"
peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [leveldbhelper] GetIterator -> DEBU 231e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:47.037 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231f No expiry entry found for expiringAtBlk [8]"
peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [lockbasedtxmgr] func1 -> DEBU 231d launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:47.037 UTC [kvledger] CommitWithPvtData -> DEBU 2320 [businesschannel] Committing block [7] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:47.038 UTC [historyleveldb] Commit -> DEBU 2321 Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:47.041 UTC [historyleveldb] Commit -> DEBU 2322 Channel [businesschannel]: Updates committed to history database for blockNo [7]"
peer0.org1.example.com | "2019-05-02 09:27:47.041 UTC [kvledger] CommitWithPvtData -> INFO 2323 [businesschannel] Committed block [7] with 1 transaction(s) in 42ms (state_validation=6ms block_commit=23ms state_commit=7ms)"
peer0.org1.example.com | "2019-05-02 09:27:47.042 UTC [msp.identity] Sign -> DEBU 2324 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020808 "
peer0.org1.example.com | "2019-05-02 09:27:47.043 UTC [msp.identity] Sign -> DEBU 2325 Sign: digest: E9B3E104B460C51C8CF5740CF1CC998546E1A13A65EAFD0BADB350E62062E1C4 "
peer0.org1.example.com | "2019-05-02 09:27:47.044 UTC [gossip.state] commitBlock -> DEBU 2326 [businesschannel] Committed block [7] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [gossip.election] waitForInterrupt -> DEBU 2327 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [gossip.election] IsLeader -> DEBU 2328 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 2329 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510071801 "
peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 232a Sign: digest: 5B75D0F8E2F5C9F45C20539EC24FCC4A203E4F0CC95A479BA6304AB53F061FE2 "
peer0.org1.example.com | "2019-05-02 09:27:47.315 UTC [gossip.election] waitForInterrupt -> DEBU 232b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [gossip.comm] Send -> DEBU 2330 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2331 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2332 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2333 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2334 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:47.532 UTC [endorser] ProcessProposal -> DEBU 2335 Entering: request from 172.18.0.8:57356"
peer0.org1.example.com | "2019-05-02 09:27:47.533 UTC [protoutils] ValidateProposalMessage -> DEBU 2336 ValidateProposalMessage starts for signed proposal 0xc004239720"
peer0.org1.example.com | "2019-05-02 09:27:47.533 UTC [protoutils] validateChannelHeader -> DEBU 2337 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:47.534 UTC [protoutils] checkSignatureFromCreator -> DEBU 2338 begin"
peer0.org1.example.com | "2019-05-02 09:27:47.534 UTC [msp] GetManagerForChain -> DEBU 2339 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233a creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}"
peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233b creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [msp.identity] Verify -> DEBU 233c Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.|
peer0.org1.example.com | 00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|"
peer0.org1.example.com | "2019-05-02 09:27:47.536 UTC [msp.identity] Verify -> DEBU 233d Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.|
peer0.org1.example.com | 00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..|
peer0.org1.example.com | 00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....|
peer0.org1.example.com | 00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.|
peer0.org1.example.com | 00000040 d7 bb 89 02 2a 50 |....*P|"
peer0.org1.example.com | "2019-05-02 09:27:47.536 UTC [protoutils] checkSignatureFromCreator -> DEBU 233e exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 233f validateChaincodeProposalMessage starts for proposal 0xc00335c930, header 0xc004239b30"
peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2340 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [endorser] preProcess -> DEBU 2341 [businesschannel][7d336586] processing txid: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8"
peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2342 retrieveTransactionByID() - txId = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]"
peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2343 acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2344 acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2345 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2346 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:47.540 UTC [policies] Evaluate -> DEBU 2347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.540 UTC [cauthdsl] func1 -> DEBU 2348 0xc0042cd4c0 gate 1556789267540791800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 2349 0xc0042cd4c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234a 0xc0042cd4c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234b 0xc0042cd4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [cauthdsl] func2 -> DEBU 234c 0xc0042cd4c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [cauthdsl] func1 -> DEBU 234d 0xc0042cd4c0 gate 1556789267540791800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [policies] Evaluate -> DEBU 234e Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 234f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2350 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2351 0xc0042cdd00 gate 1556789267543337600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2352 0xc0042cdd00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2353 0xc0042cdd00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2354 0xc0042cdd00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2355 Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.|
peer0.org1.example.com | 00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2356 Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.|
peer0.org1.example.com | 00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..|
peer0.org1.example.com | 00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....|
peer0.org1.example.com | 00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.|
peer0.org1.example.com | 00000040 d7 bb 89 02 2a 50 |....*P|"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2357 0xc0042cdd00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2358 0xc0042cdd00 gate 1556789267543337600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2359 Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235b Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 235d constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 235e constructing new tx simulator txid = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]"
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [endorser] SimulateProposal -> DEBU 235f [businesschannel][7d336586] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2360 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [endorser] callChaincode -> INFO 2361 [businesschannel][7d336586] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2362 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2363 GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [chaincode] Execute -> DEBU 2364 Entry"
peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] handleMessage -> DEBU 2365 [7d336586] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2366 [7d336586] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleGetState -> DEBU 2367 [7d336586] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [stateleveldb] GetState -> DEBU 2368 GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2369 [7d336586] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.547 UTC [chaincode] handleMessage -> DEBU 236a [7d336586] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.547 UTC [chaincode] Notify -> DEBU 236b [7d336586] notifying Txid:7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.548 UTC [chaincode] Execute -> DEBU 236c Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] callChaincode -> INFO 236d [businesschannel][7d336586] Exit chaincode: name:"exp02" (5ms)"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 236e Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] Done -> DEBU 236f Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] SimulateProposal -> DEBU 2370 [businesschannel][7d336586] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2371 [businesschannel][7d336586] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2372 [businesschannel][7d336586] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] EndorseWithPlugin -> DEBU 2373 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [msp.identity] Sign -> DEBU 2374 Sign: plaintext: 0A2076AB56B6C271AF5B382DA71F12F1...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [msp.identity] Sign -> DEBU 2375 Sign: digest: CA42D06E010E44C96A19B02059A4BF578F48C24305243196437C94821E650622 "
peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [endorser] EndorseWithPlugin -> DEBU 2376 Exiting {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [endorser] endorseProposal -> DEBU 2377 [businesschannel][7d336586] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [lockbasedtxmgr] Done -> DEBU 2378 Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]"
peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [endorser] func1 -> DEBU 2379 Exit: request from 172.18.0.8:57356"
peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [comm.grpc.server] 1 -> INFO 237a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57356 grpc.code=OK grpc.call_duration=19.0782ms
peer0.org1.example.com | "2019-05-02 09:27:47.555 UTC [grpc] infof -> DEBU 237b transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:47.556 UTC [grpc] infof -> DEBU 237c transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:47.737 UTC [endorser] ProcessProposal -> DEBU 237d Entering: request from 172.18.0.8:57360"
peer0.org1.example.com | "2019-05-02 09:27:47.737 UTC [protoutils] ValidateProposalMessage -> DEBU 237e ValidateProposalMessage starts for signed proposal 0xc0042ee730"
peer0.org1.example.com | "2019-05-02 09:27:47.738 UTC [protoutils] validateChannelHeader -> DEBU 237f validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:47.738 UTC [protoutils] checkSignatureFromCreator -> DEBU 2380 begin"
peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [msp] GetManagerForChain -> DEBU 2381 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2382 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}"
peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2383 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2384 Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#|
peer0.org1.example.com | 00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|"
peer0.org1.example.com | "2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2385 Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..|
peer0.org1.example.com | 00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...|
peer0.org1.example.com | 00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.|
peer0.org1.example.com | 00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........|
peer0.org1.example.com | 00000040 72 3f d9 42 28 68 23 |r?.B(h#|"
peer0.org1.example.com | "2019-05-02 09:27:47.741 UTC [protoutils] checkSignatureFromCreator -> DEBU 2386 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:47.741 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2387 validateChaincodeProposalMessage starts for proposal 0xc003460a80, header 0xc0042eeb40"
peer0.org1.example.com | "2019-05-02 09:27:47.742 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2388 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.742 UTC [endorser] preProcess -> DEBU 2389 [businesschannel][f788670e] processing txid: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176"
peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 238a retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]"
peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238b acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238c acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [policies] Evaluate -> DEBU 238f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [cauthdsl] func1 -> DEBU 2390 0xc004334fc0 gate 1556789267745522300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [cauthdsl] func2 -> DEBU 2391 0xc004334fc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2392 0xc004334fc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2393 0xc004334fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2394 0xc004334fc0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2395 0xc004334fc0 gate 1556789267745522300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2396 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2397 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2398 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2399 0xc004335800 gate 1556789267746848600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239a 0xc004335800 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239b 0xc004335800 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239c 0xc004335800 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239d Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#|
peer0.org1.example.com | 00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239e Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..|
peer0.org1.example.com | 00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...|
peer0.org1.example.com | 00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.|
peer0.org1.example.com | 00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........|
peer0.org1.example.com | 00000040 72 3f d9 42 28 68 23 |r?.B(h#|"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239f 0xc004335800 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func1 -> DEBU 23a0 0xc004335800 gate 1556789267746848600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a1 Signature set satisfies policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a3 Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23a5 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23a6 constructing new tx simulator txid = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [endorser] SimulateProposal -> DEBU 23a7 [businesschannel][f788670e] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23a8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [endorser] callChaincode -> INFO 23a9 [businesschannel][f788670e] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23aa GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23ab GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [chaincode] Execute -> DEBU 23ac Entry"
peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] handleMessage -> DEBU 23ad [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23ae [f788670e] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleGetState -> DEBU 23af [f788670e] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [stateleveldb] GetState -> DEBU 23b0 GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23b1 [f788670e] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.751 UTC [chaincode] handleMessage -> DEBU 23b2 [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [chaincode] HandleTransaction -> DEBU 23b3 [f788670e] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [chaincode] HandleGetState -> DEBU 23b4 [f788670e] getting state for chaincode exp02, key b, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [stateleveldb] GetState -> DEBU 23b5 GetState(). ns=exp02, key=b"
peer0.org1.example.com | "2019-05-02 09:27:47.753 UTC [chaincode] HandleTransaction -> DEBU 23b6 [f788670e] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.754 UTC [chaincode] handleMessage -> DEBU 23b7 [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b8 [f788670e] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b9 [f788670e] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] handleMessage -> DEBU 23ba [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bb [f788670e] handling PUT_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bc [f788670e] Completed PUT_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.758 UTC [chaincode] handleMessage -> DEBU 23bd [f788670e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [chaincode] Notify -> DEBU 23be [f788670e] notifying Txid:f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [chaincode] Execute -> DEBU 23bf Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [endorser] callChaincode -> INFO 23c0 [businesschannel][f788670e] Exit chaincode: name:"exp02" (12ms)"
peer0.org1.example.com | "2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 23c1 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] Done -> DEBU 23c2 Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]"
peer0.org1.example.com | "2019-05-02 09:27:47.761 UTC [endorser] SimulateProposal -> DEBU 23c3 [businesschannel][f788670e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.761 UTC [endorser] endorseProposal -> DEBU 23c4 [businesschannel][f788670e] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [endorser] endorseProposal -> DEBU 23c5 [businesschannel][f788670e] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [endorser] EndorseWithPlugin -> DEBU 23c6 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [msp.identity] Sign -> DEBU 23c7 Sign: plaintext: 0A2022CFDDD1D9F03FD9E872A68FBF65...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [msp.identity] Sign -> DEBU 23c8 Sign: digest: 7F4D0DB0FB16170EA99B1C9EDC7E0EE04F80FAD320C754C68742499AE98027A0 "
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] EndorseWithPlugin -> DEBU 23c9 Exiting {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] endorseProposal -> DEBU 23ca [businesschannel][f788670e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [lockbasedtxmgr] Done -> DEBU 23cb Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]"
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] func1 -> DEBU 23cc Exit: request from 172.18.0.8:57360"
peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [comm.grpc.server] 1 -> INFO 23cd unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57360 grpc.code=OK grpc.call_duration=26.5353ms
peer0.org1.example.com | "2019-05-02 09:27:47.781 UTC [grpc] infof -> DEBU 23ce transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:47.782 UTC [grpc] infof -> DEBU 23cf transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [endorser] ProcessProposal -> DEBU 23d0 Entering: request from 172.18.0.8:57366"
peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] ValidateProposalMessage -> DEBU 23d1 ValidateProposalMessage starts for signed proposal 0xc0042ef450"
peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] validateChannelHeader -> DEBU 23d2 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d3 begin"
peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [msp] GetManagerForChain -> DEBU 23d4 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d5 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d6 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..|
peer0.org1.example.com | 00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo|
peer0.org1.example.com | 00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....|
peer0.org1.example.com | 00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.|
peer0.org1.example.com | 00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{|
peer0.org1.example.com | 00000040 55 9d ee 03 a6 cc 68 |U.....h|"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d9 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23da validateChaincodeProposalMessage starts for proposal 0xc003460e70, header 0xc0042ef860"
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23db validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [endorser] preProcess -> DEBU 23dc [businesschannel][530e2b52] processing txid: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23dd retrieveTransactionByID() - txId = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23de acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23df acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func1 -> DEBU 23e3 0xc0043b4cc0 gate 1556789267982597500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e4 0xc0043b4cc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e5 0xc0043b4cc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e6 0xc0043b4cc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..|
peer0.org1.example.com | 00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|"
peer0.org1.example.com | "2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo|
peer0.org1.example.com | 00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....|
peer0.org1.example.com | 00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.|
peer0.org1.example.com | 00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{|
peer0.org1.example.com | 00000040 55 9d ee 03 a6 cc 68 |U.....h|"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [cauthdsl] func2 -> DEBU 23e9 0xc0043b4cc0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [cauthdsl] func1 -> DEBU 23ea 0xc0043b4cc0 gate 1556789267982597500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23eb Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ed Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23ef constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23f0 constructing new tx simulator txid = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]"
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [endorser] SimulateProposal -> DEBU 23f1 [businesschannel][530e2b52] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [endorser] callChaincode -> INFO 23f3 [businesschannel][530e2b52] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f5 GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [chaincode] Execute -> DEBU 23f6 Entry"
peer0.org1.example.com | "2019-05-02 09:27:47.987 UTC [chaincode] handleMessage -> DEBU 23f7 [530e2b52] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23f8 [530e2b52] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleGetState -> DEBU 23f9 [530e2b52] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [stateleveldb] GetState -> DEBU 23fa GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23fb [530e2b52] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] handleMessage -> DEBU 23fc [530e2b52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] Notify -> DEBU 23fd [530e2b52] notifying Txid:530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] Execute -> DEBU 23fe Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [endorser] callChaincode -> INFO 23ff [businesschannel][530e2b52] Exit chaincode: name:"exp02" (5ms)"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2400 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] Done -> DEBU 2401 Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]"
peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [endorser] SimulateProposal -> DEBU 2402 [businesschannel][530e2b52] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2403 [businesschannel][530e2b52] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2404 [businesschannel][530e2b52] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2405 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2406 Sign: plaintext: 0A202175C709353540E8383BBA807F9D...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2407 Sign: digest: 13DF92C85D3D98E9660CD59358942D66AA4BB186A238D02DE1B85C13BB2342A5 "
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2408 Exiting {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2409 [businesschannel][530e2b52] Exit"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [lockbasedtxmgr] Done -> DEBU 240a Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] func1 -> DEBU 240b Exit: request from 172.18.0.8:57366"
peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [comm.grpc.server] 1 -> INFO 240c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57366 grpc.code=OK grpc.call_duration=11.6036ms
peer0.org1.example.com | "2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240d transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 240f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 2410 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] Send -> DEBU 2411 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2412 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2413 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2414 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2415 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2416 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2417 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [gossip.gossip] handleMessage -> DEBU 2418 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 2419 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..|
peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|"
peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 241a Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@|
peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.|
peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..|
peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.|
peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|"
peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 241d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2420 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2421 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2422 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2423 0xc0043f28b0 gate 1556789268251419900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2424 0xc0043f28b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2425 0xc0043f28b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2426 0xc0043f28b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2427 0xc0043f28b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2428 0xc0043f28b0 gate 1556789268251419900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2429 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 242c 0xc0043f30f0 gate 1556789268251817900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242d 0xc0043f30f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242e 0xc0043f30f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242f 0xc0043f30f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2430 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2431 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [cauthdsl] func2 -> DEBU 2432 0xc0043f30f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [cauthdsl] func1 -> DEBU 2433 0xc0043f30f0 gate 1556789268251817900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2434 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2435 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2436 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2437 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2438 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2439 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 243a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 243d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2440 0xc0044028c0 gate 1556789268253151500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2441 0xc0044028c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2442 0xc0044028c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2443 0xc0044028c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2444 0xc0044028c0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2445 0xc0044028c0 gate 1556789268253151500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2446 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2448 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2449 0xc004403100 gate 1556789268253762800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244a 0xc004403100 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244b 0xc004403100 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244c 0xc004403100 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [gossip.comm] Send -> DEBU 244f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 2450 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [msp] DeserializeIdentity -> DEBU 2451 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2452 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2453 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2454 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2455 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2456 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2457 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp.identity] Verify -> DEBU 2458 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.|
peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|"
peer0.org1.example.com | "2019-05-02 09:27:48.256 UTC [msp.identity] Verify -> DEBU 2459 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..|
peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.|
peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{|
peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.|
peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|"
peer0.org1.example.com | "2019-05-02 09:27:48.256 UTC [cauthdsl] func2 -> DEBU 245a 0xc004403100 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [cauthdsl] func1 -> DEBU 245b 0xc004403100 gate 1556789268253762800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [msp.identity] Verify -> DEBU 2460 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 2461 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2462 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2463 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2464 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2466 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func1 -> DEBU 2467 0xc004426800 gate 1556789268258599200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2468 0xc004426800 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2469 0xc004426800 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 246a 0xc004426800 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246b Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246c Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [cauthdsl] func2 -> DEBU 246d 0xc004426800 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [cauthdsl] func1 -> DEBU 246e 0xc004426800 gate 1556789268258599200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 246f Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2470 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2471 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2472 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2473 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2474 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2476 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..|
peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|"
peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2477 Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@|
peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.|
peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..|
peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.|
peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|"
peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2478 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2479 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.261 UTC [msp] DeserializeIdentity -> DEBU 247b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 247c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 247f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 2480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [policies] Evaluate -> DEBU 2481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func1 -> DEBU 2482 0xc00443f150 gate 1556789268264625900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2483 0xc00443f150 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2484 0xc00443f150 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2485 0xc00443f150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2486 0xc00443f150 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func1 -> DEBU 2487 0xc00443f150 gate 1556789268264625900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 248a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [cauthdsl] func1 -> DEBU 248b 0xc00443f990 gate 1556789268266903400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248c 0xc00443f990 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248d 0xc00443f990 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248e 0xc00443f990 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 248f Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.|
peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|"
peer0.org1.example.com | "2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 2490 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..|
peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.|
peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{|
peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.|
peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|"
peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [cauthdsl] func2 -> DEBU 2491 0xc00443f990 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [cauthdsl] func1 -> DEBU 2492 0xc00443f990 gate 1556789268266903400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2495 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [msp] DeserializeIdentity -> DEBU 2497 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [msp] DeserializeIdentity -> DEBU 2498 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2499 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func1 -> DEBU 249f 0xc004453160 gate 1556789268273201000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a0 0xc004453160 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a1 0xc004453160 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a2 0xc004453160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a3 0xc004453160 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func1 -> DEBU 24a4 0xc004453160 gate 1556789268273201000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [policies] Evaluate -> DEBU 24a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.276 UTC [cauthdsl] func1 -> DEBU 24a8 0xc0044539a0 gate 1556789268276482200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.276 UTC [cauthdsl] func2 -> DEBU 24a9 0xc0044539a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24aa 0xc0044539a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24ab 0xc0044539a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [msp.identity] Verify -> DEBU 24ac Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:48.278 UTC [msp.identity] Verify -> DEBU 24ad Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [cauthdsl] func2 -> DEBU 24ae 0xc0044539a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [cauthdsl] func1 -> DEBU 24af 0xc0044539a0 gate 1556789268276482200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b2 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [msp] DeserializeIdentity -> DEBU 24b4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [policies] Evaluate -> DEBU 24b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [cauthdsl] func1 -> DEBU 24ba 0xc004464a80 gate 1556789268282587800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [cauthdsl] func2 -> DEBU 24bb 0xc004464a80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bc 0xc004464a80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bd 0xc004464a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.284 UTC [cauthdsl] func2 -> DEBU 24be 0xc004464a80 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [cauthdsl] func1 -> DEBU 24bf 0xc004464a80 gate 1556789268282587800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [policies] Evaluate -> DEBU 24c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [cauthdsl] func1 -> DEBU 24c4 0xc0044652c0 gate 1556789268286391400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [gossip.comm] func1 -> DEBU 24c0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [cauthdsl] func2 -> DEBU 24c5 0xc0044652c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c6 0xc0044652c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c7 0xc0044652c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [msp.identity] Verify -> DEBU 24c8 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [msp.identity] Verify -> DEBU 24c9 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [cauthdsl] func2 -> DEBU 24ca 0xc0044652c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [gossip.comm] func1 -> DEBU 24cb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [cauthdsl] func1 -> DEBU 24cc 0xc0044652c0 gate 1556789268286391400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24cf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [msp] DeserializeIdentity -> DEBU 24d3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d4 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.|
peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|"
peer0.org1.example.com | "2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d5 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-|
peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..|
peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....|
peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.|
peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|"
peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24d9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24da Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func1 -> DEBU 24de 0xc0044774f0 gate 1556789268294600500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24df 0xc0044774f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24e0 0xc0044774f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e1 0xc0044774f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e2 0xc0044774f0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e3 0xc0044774f0 gate 1556789268294600500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e7 0xc004477d30 gate 1556789268295938500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e8 0xc004477d30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e9 0xc004477d30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24ea 0xc004477d30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [msp.identity] Verify -> DEBU 24eb Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......|
peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [msp.identity] Verify -> DEBU 24ec Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w|
peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v|
peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B|
peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....|
peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [cauthdsl] func2 -> DEBU 24ed 0xc004477d30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [cauthdsl] func1 -> DEBU 24ee 0xc004477d30 gate 1556789268295938500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [policies] Evaluate -> DEBU 24f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [policies] Evaluate -> DEBU 24f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func1 -> DEBU 24fb 0xc00448f500 gate 1556789268300169100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fc 0xc00448f500 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fd 0xc00448f500 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fe 0xc00448f500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [cauthdsl] func2 -> DEBU 24ff 0xc00448f500 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [cauthdsl] func1 -> DEBU 2500 0xc00448f500 gate 1556789268300169100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2501 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2502 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2503 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func1 -> DEBU 2504 0xc00448fd40 gate 1556789268302168700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2505 0xc00448fd40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2506 0xc00448fd40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2507 0xc00448fd40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [msp.identity] Verify -> DEBU 2508 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.|
peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|"
peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [msp.identity] Verify -> DEBU 2509 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. |
peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3|
peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$|
peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E|
peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|"
peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [cauthdsl] func2 -> DEBU 250a 0xc00448fd40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [cauthdsl] func1 -> DEBU 250b 0xc00448fd40 gate 1556789268302168700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [msp] DeserializeIdentity -> DEBU 2510 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2511 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2512 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2513 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2514 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2515 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [cauthdsl] func1 -> DEBU 2516 0xc0044a2e20 gate 1556789268305827600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [cauthdsl] func2 -> DEBU 2517 0xc0044a2e20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2518 0xc0044a2e20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2519 0xc0044a2e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 251a 0xc0044a2e20 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func1 -> DEBU 251b 0xc0044a2e20 gate 1556789268305827600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func1 -> DEBU 251f 0xc0044a3660 gate 1556789268307067800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2520 0xc0044a3660 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2521 0xc0044a3660 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2522 0xc0044a3660 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2523 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.|
peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|"
peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2524 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. |
peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3|
peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$|
peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E|
peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|"
peer0.org1.example.com | "2019-05-02 09:27:48.308 UTC [cauthdsl] func2 -> DEBU 2525 0xc0044a3660 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.308 UTC [cauthdsl] func1 -> DEBU 2526 0xc0044a3660 gate 1556789268307067800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2527 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2529 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 252a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [msp.identity] Verify -> DEBU 252b Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....|
peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|"
peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [msp.identity] Verify -> DEBU 252c Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj|
peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<|
peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&|
peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..|
peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|"
peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 252f Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....|
peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|"
peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 2530 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj|
peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<|
peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&|
peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..|
peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|"
peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp] DeserializeIdentity -> DEBU 2531 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.312 UTC [gossip.gossip] handleMessage -> DEBU 2532 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.506 UTC [gossip.gossip] handleMessage -> DEBU 2533 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2534 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2535 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.508 UTC [gossip.gossip] handleMessage -> DEBU 2536 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.515 UTC [gossip.gossip] handleMessage -> DEBU 2537 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2538 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2539 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [gossip.gossip] handleMessage -> DEBU 253a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.520 UTC [gossip.comm] func1 -> DEBU 253b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [gossip.gossip] handleMessage -> DEBU 253c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253d Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253e Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:48.522 UTC [msp] DeserializeIdentity -> DEBU 253f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.522 UTC [gossip.gossip] handleMessage -> DEBU 2540 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.533 UTC [gossip.gossip] handleMessage -> DEBU 2541 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2542 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2543 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:48.536 UTC [msp] DeserializeIdentity -> DEBU 2544 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.536 UTC [gossip.gossip] handleMessage -> DEBU 2545 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2546 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5251891166630219281 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.pull] HandleMessage -> DEBU 2547 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5251891166630219281 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.pull] SendDigest -> DEBU 2548 Sending BLOCK_MSG digest: [4 5 6 7 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2549 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.753 UTC [gossip.gossip] handleMessage -> DEBU 254a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.753 UTC [msp] DeserializeIdentity -> DEBU 254b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [gossip.gossip] handleMessage -> DEBU 254e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [gossip.gossip] handleMessage -> DEBU 254f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [msp] DeserializeIdentity -> DEBU 2550 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2551 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2552 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2553 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2554 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2555 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2556 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func1 -> DEBU 2557 0xc0044f2ed0 gate 1556789268762539800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2558 0xc0044f2ed0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2559 0xc0044f2ed0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 255a 0xc0044f2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 255b 0xc0044f2ed0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 255c 0xc0044f2ed0 gate 1556789268762539800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 2560 0xc0044f3710 gate 1556789268763478500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2561 0xc0044f3710 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2562 0xc0044f3710 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2563 0xc0044f3710 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [msp.identity] Verify -> DEBU 2564 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [msp.identity] Verify -> DEBU 2565 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [cauthdsl] func2 -> DEBU 2566 0xc0044f3710 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [cauthdsl] func1 -> DEBU 2567 0xc0044f3710 gate 1556789268763478500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2568 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2569 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [msp] DeserializeIdentity -> DEBU 256c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [gossip.gossip] handleMessage -> DEBU 256d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.767 UTC [gossip.comm] func1 -> DEBU 256e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.767 UTC [gossip.gossip] handleMessage -> DEBU 256f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [msp] DeserializeIdentity -> DEBU 2570 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2571 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2572 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2573 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2574 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2575 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 2577 0xc004507280 gate 1556789268768569000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2578 0xc004507280 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2579 0xc004507280 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257a 0xc004507280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257b 0xc004507280 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 257c 0xc004507280 gate 1556789268768569000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 257d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2580 0xc004507ac0 gate 1556789268769127900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2581 0xc004507ac0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2582 0xc004507ac0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2583 0xc004507ac0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2584 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2585 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2586 0xc004507ac0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2587 0xc004507ac0 gate 1556789268769127900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2588 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2589 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.770 UTC [msp] DeserializeIdentity -> DEBU 258c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.770 UTC [gossip.gossip] handleMessage -> DEBU 258d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.comm] func1 -> DEBU 258e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 258f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 2590 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2591 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2592 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [msp] DeserializeIdentity -> DEBU 2593 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2594 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2595 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2596 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2598 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2599 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [cauthdsl] func1 -> DEBU 259a 0xc00451b9b0 gate 1556789268803937500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259b 0xc00451b9b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259c 0xc00451b9b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259d 0xc00451b9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259e 0xc00451b9b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 259f 0xc00451b9b0 gate 1556789268803937500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 25a3 0xc00452e1f0 gate 1556789268804893200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 25a4 0xc00452e1f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a5 0xc00452e1f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a6 0xc00452e1f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a7 Verify: digest = 00000000 7b 98 ff a8 3f da 20 30 17 05 b3 77 64 bc b0 b2 |{...?. 0...wd...|
peer0.org1.example.com | 00000010 0e 41 f2 02 55 9f 6b 22 17 72 47 c0 35 2b d0 00 |.A..U.k".rG.5+..|"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a8 Verify: sig = 00000000 30 45 02 21 00 ba 38 b9 2d 06 48 b0 09 68 0a ef |0E.!..8.-.H..h..|
peer0.org1.example.com | 00000010 fc 0a 79 2b 7a 6c 56 3a 5c e3 e2 49 34 96 71 20 |..y+zlV:\..I4.q |
peer0.org1.example.com | 00000020 1d 6d 3a da ba 02 20 11 de 87 a6 61 4b 15 d2 a5 |.m:... ....aK...|
peer0.org1.example.com | 00000030 9a 63 f9 94 9d 1a c6 c1 da d1 bf 41 43 64 8c ee |.c.........ACd..|
peer0.org1.example.com | 00000040 4e 69 e5 82 1b e2 6c |Ni....l|"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a9 0xc00452e1f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func1 -> DEBU 25aa 0xc00452e1f0 gate 1556789268804893200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ad Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25b5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25b6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25b9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25be Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.comm] func1 -> DEBU 25c5 Got message: GossipMessage: tag:EMPTY hello:<nonce:1022257856871090133 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.gossip] handleMessage -> DEBU 25c6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:1022257856871090133 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.pull] HandleMessage -> DEBU 25c7 GossipMessage: tag:EMPTY hello:<nonce:1022257856871090133 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25ca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [msp] DeserializeIdentity -> DEBU 25cd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [gossip.pull] SendDigest -> DEBU 25ce Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [gossip.gossip] handleMessage -> DEBU 25cf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.821 UTC [gossip.gossip] handleMessage -> DEBU 25d0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.gossip] handleMessage -> DEBU 25d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.831 UTC [gossip.comm] func1 -> DEBU 25d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.831 UTC [gossip.gossip] handleMessage -> DEBU 25d5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.gossip] handleMessage -> DEBU 25d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25d8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [msp] DeserializeIdentity -> DEBU 25d9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25da Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25dc Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [policies] Evaluate -> DEBU 25df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [cauthdsl] func1 -> DEBU 25e0 0xc00455d010 gate 1556789268834572300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [cauthdsl] func2 -> DEBU 25e1 0xc00455d010 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e2 0xc00455d010 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e3 0xc00455d010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e4 0xc00455d010 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func1 -> DEBU 25e5 0xc00455d010 gate 1556789268834572300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [cauthdsl] func1 -> DEBU 25e9 0xc00455d850 gate 1556789268836696400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [cauthdsl] func2 -> DEBU 25ea 0xc00455d850 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25eb 0xc00455d850 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25ec 0xc00455d850 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ed Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....|
peer0.org1.example.com | 00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|"
peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ee Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>|
peer0.org1.example.com | 00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie|
peer0.org1.example.com | 00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"|
peer0.org1.example.com | 00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..|
peer0.org1.example.com | 00000040 92 76 ab 56 bb ca |.v.V..|"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [cauthdsl] func2 -> DEBU 25ef 0xc00455d850 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [cauthdsl] func1 -> DEBU 25f0 0xc00455d850 gate 1556789268836696400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 25f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25fa Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] handleAliveMessage -> DEBU 25fb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.840 UTC [gossip.discovery] sendMemResponse -> DEBU 25fd Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25fe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25ff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 2600 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] Send -> DEBU 2601 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.discovery] sendMemResponse -> DEBU 2602 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2603 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2604 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2605 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2606 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.gossip] handleMessage -> DEBU 2607 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.990 UTC [msp] DeserializeIdentity -> DEBU 2608 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 2609 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 260a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [gossip.gossip] handleMessage -> DEBU 260b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:48.992 UTC [gossip.gossip] handleMessage -> DEBU 260c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:48.992 UTC [msp] DeserializeIdentity -> DEBU 260d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 260e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 260f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2610 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func1 -> DEBU 2614 0xc00458ca80 gate 1556789268995205500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2615 0xc00458ca80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2616 0xc00458ca80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2617 0xc00458ca80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2618 0xc00458ca80 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 2619 0xc00458ca80 gate 1556789268995205500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 261d 0xc00458d2c0 gate 1556789268996959200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261e 0xc00458d2c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261f 0xc00458d2c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 2620 0xc00458d2c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.|
peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|"
peer0.org1.example.com | "2019-05-02 09:27:48.998 UTC [msp.identity] Verify -> DEBU 2622 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. |
peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3|
peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$|
peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E|
peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|"
peer0.org1.example.com | "2019-05-02 09:27:48.998 UTC [cauthdsl] func2 -> DEBU 2623 0xc00458d2c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:48.999 UTC [cauthdsl] func1 -> DEBU 2624 0xc00458d2c0 gate 1556789268996959200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.001 UTC [policies] Evaluate -> DEBU 2625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2627 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [gossip.gossip] handleMessage -> DEBU 262a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [gossip.pull] Hello -> DEBU 262d Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] Send -> DEBU 2630 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11370566117805470300 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2631 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11370566117805470300 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2632 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.006 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.007 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.007 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2636 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101B "
peer0.org1.example.com | "2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2637 Sign: digest: 3C9763F32527B00797EDDEC06813EDD9B992BECEEB58EAC8B782CF46E6F1E095 "
peer0.org1.example.com | "2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2638 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2639 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:49.044 UTC [gossip.discovery] periodicalSendAlive -> DEBU 263a Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:49.048 UTC [msp] DeserializeIdentity -> DEBU 263b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.049 UTC [msp] DeserializeIdentity -> DEBU 263c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.049 UTC [gossip.comm] Send -> DEBU 263d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [msp] DeserializeIdentity -> DEBU 263e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [gossip.comm] Send -> DEBU 263f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2640 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [msp] DeserializeIdentity -> DEBU 2641 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2642 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] Send -> DEBU 2643 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2644 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2645 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2646 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2647 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.090 UTC [gossip.pull] Hello -> DEBU 2648 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:49.091 UTC [gossip.comm] Send -> DEBU 2649 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10473393887253975232 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.092 UTC [gossip.pull] Hello -> DEBU 264a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.comm] Send -> DEBU 264b Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3336650009731732356 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.pull] Hello -> DEBU 264c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] Send -> DEBU 264f Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6061621436322034165 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2650 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6061621436322034165 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2651 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.098 UTC [gossip.comm] sendToEndpoint -> DEBU 264e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3336650009731732356 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2652 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.comm] sendToEndpoint -> DEBU 264d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10473393887253975232 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.100 UTC [gossip.comm] sendToEndpoint -> DEBU 2653 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.gossip] handleMessage -> DEBU 2654 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.104 UTC [gossip.gossip] handleMessage -> DEBU 2655 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.105 UTC [gossip.gossip] handleMessage -> DEBU 2656 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:6577386042096610242 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.107 UTC [gossip.pull] HandleMessage -> DEBU 2658 GossipMessage: tag:EMPTY hello:<nonce:6577386042096610242 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2657 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.108 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2659 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.108 UTC [gossip.pull] SendDigest -> DEBU 265a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [msp.identity] Verify -> DEBU 265c Verify: digest = 00000000 78 5d f0 85 0f 78 62 8e 8d 34 76 97 b8 80 60 0e |x]...xb..4v...`.|
peer0.org1.example.com | 00000010 04 3e ee e3 45 67 42 6a 1d a7 a5 1c 57 13 1c 46 |.>..EgBj....W..F|"
peer0.org1.example.com | "2019-05-02 09:27:49.110 UTC [msp.identity] Verify -> DEBU 265d Verify: sig = 00000000 30 44 02 20 1e aa 15 e4 2e 04 d6 f0 b4 b0 b0 7b |0D. ...........{|
peer0.org1.example.com | 00000010 49 d0 59 a5 09 9c d7 f0 3f 6e f3 5b 69 3c 63 cc |I.Y.....?n.[i<c.|
peer0.org1.example.com | 00000020 00 a9 c4 21 02 20 2e b5 74 c5 d1 12 b0 c7 e2 3f |...!. ..t......?|
peer0.org1.example.com | 00000030 a0 98 0b 63 3c cb 3e 18 ee 88 9e 2f e5 b4 ac cc |...c<.>..../....|
peer0.org1.example.com | 00000040 25 51 1a 6f c3 7a |%Q.o.z|"
peer0.org1.example.com | "2019-05-02 09:27:49.111 UTC [msp.identity] Verify -> DEBU 265f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:49.114 UTC [msp.identity] Verify -> DEBU 2660 Verify: sig = 00000000 30 45 02 21 00 a4 fe c1 d1 0d 87 f8 46 f1 47 5f |0E.!........F.G_|
peer0.org1.example.com | 00000010 d6 2c 18 ab 60 e5 e9 90 76 9c 72 e8 c5 90 74 28 |.,..`...v.r...t(|
peer0.org1.example.com | 00000020 67 1d ea 23 59 02 20 08 d7 7a bd aa 24 cd 22 c5 |g..#Y. ..z..$.".|
peer0.org1.example.com | 00000030 92 73 5a e7 4b 92 6e fa 0c 6f 19 31 5f 97 20 8f |.sZ.K.n..o.1_. .|
peer0.org1.example.com | 00000040 46 bd 42 92 ba 7d c1 |F.B..}.|"
peer0.org1.example.com | "2019-05-02 09:27:49.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 2661 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2662 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2663 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2664 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2665 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2666 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 2667 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2668 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.118 UTC [gossip.pull] HandleMessage -> DEBU 2669 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.118 UTC [gossip.gossip] handleMessage -> DEBU 266a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.pull] HandleMessage -> DEBU 266e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 266f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 2670 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2671 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2672 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2673 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.121 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2674 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......|
peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|"
peer0.org1.example.com | "2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2676 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M|
peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.|
peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...|
peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e.....<GR..|
peer0.org1.example.com | 00000040 ec 86 17 f6 8d 55 |.....U|"
peer0.org1.example.com | "2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2677 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:49.123 UTC [msp.identity] Verify -> DEBU 2678 Verify: sig = 00000000 30 45 02 21 00 ef 4d 61 a2 d6 91 17 58 da 67 b0 |0E.!..Ma....X.g.|
peer0.org1.example.com | 00000010 e3 f1 82 93 4c 43 a7 45 26 09 09 d7 e4 f0 21 cf |....LC.E&.....!.|
peer0.org1.example.com | 00000020 9d fb 12 c1 20 02 20 74 b7 07 20 bf 91 0a 66 50 |.... . t.. ...fP|
peer0.org1.example.com | 00000030 db 35 c2 01 e8 c5 a9 c1 57 d9 30 2e d1 b0 37 0f |.5......W.0...7.|
peer0.org1.example.com | 00000040 b9 21 c1 7b 58 60 46 |.!.{X`F|"
peer0.org1.example.com | "2019-05-02 09:27:49.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2679 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] learnExistingMembers -> DEBU 267e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 267f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2680 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [gossip.discovery] sendMemResponse -> DEBU 2681 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2683 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] Send -> DEBU 2684 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.discovery] sendMemResponse -> DEBU 2685 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2686 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2687 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.gossip] handleMessage -> DEBU 2688 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 2689 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 268a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [gossip.comm] Send -> DEBU 268c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] Send -> DEBU 268e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 268f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 2690 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [gossip.comm] func1 -> DEBU 2691 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.133 UTC [gossip.comm] func1 -> DEBU 2694 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.133 UTC [gossip.gossip] handleMessage -> DEBU 2695 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.134 UTC [gossip.gossip] handleMessage -> DEBU 2696 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [msp.identity] Sign -> DEBU 2692 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101C "
peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [msp.identity] Sign -> DEBU 2699 Sign: digest: BD1BD6FE9C1F80CB993D510424B58C699DF27D8503A07D17D8B1F81C087E00B4 "
peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [gossip.comm] sendToEndpoint -> DEBU 2693 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [gossip.gossip] handleMessage -> DEBU 2697 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2698 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [msp.identity] Sign -> DEBU 269a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [msp.identity] Sign -> DEBU 269d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.comm] sendToEndpoint -> DEBU 269e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 269f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [msp] DeserializeIdentity -> DEBU 26a0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 26a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [msp] DeserializeIdentity -> DEBU 26a2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] Send -> DEBU 26a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.pull] HandleMessage -> DEBU 269b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.141 UTC [gossip.gossip] handleMessage -> DEBU 26aa Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.144 UTC [gossip.comm] func1 -> DEBU 26ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.144 UTC [gossip.gossip] handleMessage -> DEBU 26ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.145 UTC [gossip.gossip] handleMessage -> DEBU 26ad Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.146 UTC [gossip.gossip] handleMessage -> DEBU 26af Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b1 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......|
peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|"
peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b2 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M|
peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.|
peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...|
peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e.....<GR..|
peer0.org1.example.com | 00000040 ec 86 17 f6 8d 55 |.....U|"
peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b6 Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i|
peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|"
peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b7 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.|
peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..|
peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...|
peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....|
peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|"
peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [gossip.discovery] isSentByMe -> DEBU 26b9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26bb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0046420e0 gate 1556789269151479200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0046420e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0046420e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0046420e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0046420e0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0046420e0 gate 1556789269151479200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func1 -> DEBU 26cc 0xc004642920 gate 1556789269153026500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cd 0xc004642920 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26ce 0xc004642920 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cf 0xc004642920 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....|
peer0.org1.example.com | 00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|"
peer0.org1.example.com | "2019-05-02 09:27:49.154 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>|
peer0.org1.example.com | 00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie|
peer0.org1.example.com | 00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"|
peer0.org1.example.com | 00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..|
peer0.org1.example.com | 00000040 92 76 ab 56 bb ca |.v.V..|"
peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [cauthdsl] func2 -> DEBU 26d2 0xc004642920 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [cauthdsl] func1 -> DEBU 26d3 0xc004642920 gate 1556789269153026500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26da Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26dc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.162 UTC [gossip.gossip] handleMessage -> DEBU 26dd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.165 UTC [gossip.gossip] handleMessage -> DEBU 26de Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [msp] DeserializeIdentity -> DEBU 26df Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e1 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e2 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.169 UTC [gossip.comm] func1 -> DEBU 26e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:49.169 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func1 -> DEBU 26e7 0xc004658580 gate 1556789269170286900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e8 0xc004658580 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e9 0xc004658580 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26ea 0xc004658580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26eb 0xc004658580 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26ec 0xc004658580 gate 1556789269170286900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26f0 0xc004658dc0 gate 1556789269171948900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f1 0xc004658dc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f2 0xc004658dc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f3 0xc004658dc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.173 UTC [msp.identity] Verify -> DEBU 26f4 Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o|
peer0.org1.example.com | 00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|"
peer0.org1.example.com | "2019-05-02 09:27:49.183 UTC [msp.identity] Verify -> DEBU 26f5 Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{|
peer0.org1.example.com | 00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U|
peer0.org1.example.com | 00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....|
peer0.org1.example.com | 00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...|
peer0.org1.example.com | 00000040 9c 37 68 e1 92 b4 |.7h...|"
peer0.org1.example.com | "2019-05-02 09:27:49.184 UTC [cauthdsl] func2 -> DEBU 26f6 0xc004658dc0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.184 UTC [cauthdsl] func1 -> DEBU 26f7 0xc004658dc0 gate 1556789269171948900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fa Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26fe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 26ff Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i|
peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|"
peer0.org1.example.com | "2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 2700 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.|
peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..|
peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...|
peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....|
peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|"
peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2701 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] isSentByMe -> DEBU 2702 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2703 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2704 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.193 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......|
peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|"
peer0.org1.example.com | "2019-05-02 09:27:49.194 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M|
peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.|
peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...|
peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e.....<GR..|
peer0.org1.example.com | 00000040 ec 86 17 f6 8d 55 |.....U|"
peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2708 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2709 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 270a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 270b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270c Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i|
peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|"
peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270d Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.|
peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..|
peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...|
peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....|
peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|"
peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270f Verify: sig = 00000000 30 44 02 20 7c 18 55 c5 f9 ae 5c d3 2a 4a 79 bb |0D. |.U...\.*Jy.|
peer0.org1.example.com | 00000010 55 fc 6a c9 b7 54 32 3d ae 16 06 26 04 63 13 98 |U.j..T2=...&.c..|
peer0.org1.example.com | 00000020 63 94 d8 f8 02 20 03 81 cf 5b 1b 33 29 ba 97 d5 |c.... ...[.3)...|
peer0.org1.example.com | 00000030 5d 03 fe 3d 70 04 49 41 2d 5f 75 84 2f 2b da 82 |]..=p.IA-_u./+..|
peer0.org1.example.com | 00000040 b0 38 ff 76 1a 39 |.8.v.9|"
peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2710 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] isSentByMe -> DEBU 2711 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2712 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2713 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2714 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2716 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2717 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2718 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:15102711477349021016 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [gossip.pull] HandleMessage -> DEBU 2719 GossipMessage: tag:EMPTY hello:<nonce:15102711477349021016 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 2720 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 271c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.204 UTC [gossip.pull] SendDigest -> DEBU 2721 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2722 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2723 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.204 UTC [msp] DeserializeIdentity -> DEBU 2724 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2725 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2726 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2727 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2728 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2729 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 272a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [cauthdsl] func1 -> DEBU 272b 0xc004642320 gate 1556789269207666200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [cauthdsl] func2 -> DEBU 272c 0xc004642320 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272d 0xc004642320 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272e 0xc004642320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272f 0xc004642320 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func1 -> DEBU 2730 0xc004642320 gate 1556789269207666200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2731 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2732 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [policies] Evaluate -> DEBU 2733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func1 -> DEBU 2734 0xc004642b60 gate 1556789269209224000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2735 0xc004642b60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2736 0xc004642b60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2737 0xc004642b60 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2738 Verify: digest = 00000000 be b6 0e ab a3 44 29 70 3c be c5 26 00 3f d9 9a |.....D)p<..&.?..|
peer0.org1.example.com | 00000010 d0 68 c4 fc 42 20 88 25 1e 22 8d 2a a7 33 5c f9 |.h..B .%.".*.3\.|"
peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2739 Verify: sig = 00000000 30 44 02 20 44 34 3d 35 9f 83 a9 e3 2a 0a 45 ec |0D. D4=5....*.E.|
peer0.org1.example.com | 00000010 ba e8 d2 07 91 a9 6f 5b 90 7b b2 d1 ff b1 0c 50 |......o[.{.....P|
peer0.org1.example.com | 00000020 d7 4e f8 85 02 20 13 ff 0c b4 43 b8 b9 2a f2 7d |.N... ....C..*.}|
peer0.org1.example.com | 00000030 a4 cc 72 be f6 b4 08 10 18 11 6d f8 ff 4b 5d 0a |..r.......m..K].|
peer0.org1.example.com | 00000040 4c 73 07 21 5c 38 |Ls.!\8|"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [cauthdsl] func2 -> DEBU 273a 0xc004642b60 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [cauthdsl] func1 -> DEBU 273b 0xc004642b60 gate 1556789269209224000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 2740 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2741 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2742 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2743 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 "
peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2744 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 2745 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 2746 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2747 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2748 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2749 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2750 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2751 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [msp] DeserializeIdentity -> DEBU 2752 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2754 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2755 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [policies] Evaluate -> DEBU 2756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func1 -> DEBU 2759 0xc0045bd860 gate 1556789269215193500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275a 0xc0045bd860 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275b 0xc0045bd860 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275c 0xc0045bd860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [cauthdsl] func2 -> DEBU 275d 0xc0045bd860 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [cauthdsl] func1 -> DEBU 275e 0xc0045bd860 gate 1556789269215193500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 275f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2762 0xc00451a0a0 gate 1556789269217045700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2763 0xc00451a0a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2764 0xc00451a0a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2765 0xc00451a0a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2766 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>|
peer0.org1.example.com | 00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2767 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~|
peer0.org1.example.com | 00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.|
peer0.org1.example.com | 00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1|
peer0.org1.example.com | 00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l|
peer0.org1.example.com | 00000040 4f 21 b8 78 20 06 |O!.x .|"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2768 0xc00451a0a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2769 0xc00451a0a0 gate 1556789269217045700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 276e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 276f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2770 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2771 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 "
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2772 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2773 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 2774 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2775 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] sendMemResponse -> DEBU 2776 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [msp] DeserializeIdentity -> DEBU 2777 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2778 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2779 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] Send -> DEBU 277a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.discovery] sendMemResponse -> DEBU 277b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.gossip] handleMessage -> DEBU 277e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 277f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 2780 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2781 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2782 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2783 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2784 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [gossip.comm] Send -> DEBU 2786 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2787 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] Send -> DEBU 2788 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 2789 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 278a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278e Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 278f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 2790 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [policies] Evaluate -> DEBU 2791 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func1 -> DEBU 2792 0xc003936510 gate 1556789269808070900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2793 0xc003936510 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2794 0xc003936510 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2795 0xc003936510 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [msp.identity] Verify -> DEBU 2796 Verify: digest = 00000000 27 30 54 77 93 7b bc 69 63 ed d7 aa 5a 8e 0a 5f |'0Tw.{.ic...Z.._|
peer0.org1.example.com | 00000010 84 81 a0 7d ac 0d 90 db c5 c7 d1 61 46 d8 2b 6a |...}.......aF.+j|"
peer0.org1.example.com | "2019-05-02 09:27:49.809 UTC [msp.identity] Verify -> DEBU 2797 Verify: sig = 00000000 30 44 02 20 31 00 d0 ca 4a 78 30 f4 ca f2 b9 94 |0D. 1...Jx0.....|
peer0.org1.example.com | 00000010 5f e3 d6 22 26 a9 ca c9 e1 48 d5 65 55 c6 98 a5 |_.."&....H.eU...|
peer0.org1.example.com | 00000020 96 9d 9f bd 02 20 7a ce 10 8a 26 35 1b b0 81 81 |..... z...&5....|
peer0.org1.example.com | 00000030 71 b6 57 49 b8 64 f3 45 d6 b6 0e e0 54 db 09 02 |q.WI.d.E....T...|
peer0.org1.example.com | 00000040 7d 1a 38 48 d0 98 |}.8H..|"
peer0.org1.example.com | "2019-05-02 09:27:49.809 UTC [cauthdsl] func2 -> DEBU 2798 0xc003936510 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [cauthdsl] func1 -> DEBU 2799 0xc003936510 gate 1556789269808070900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279c Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:27:49.811 UTC [blocksProvider] DeliverBlocks -> DEBU 279e [businesschannel] Adding payload to local buffer, blockNum = [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.811 UTC [gossip.state] addPayload -> DEBU 279f [businesschannel] Adding payload to local buffer, blockNum = [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.812 UTC [gossip.state] addPayload -> DEBU 27a0 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [blocksProvider] DeliverBlocks -> DEBU 27a2 [businesschannel] Gossiping block [8], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a4 [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.privdata] StoreBlock -> INFO 27a5 [businesschannel] Received block [8] from buffer"
peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [gossip.privdata] StoreBlock -> DEBU 27a6 [businesschannel] Validating block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.channel] AddToMsgStore -> DEBU 27a3 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a7 [businesschannel] START Block Validation for block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a8 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] validateTx -> DEBU 27a9 [businesschannel] validateTx starts for block 0xc0045e0380 env 0xc00443aaf0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ab ValidateTransactionEnvelope starts for envelope 0xc00443aaf0"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ac Header is channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" "
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] validateChannelHeader -> DEBU 27ad validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27ae begin"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [msp] GetManagerForChain -> DEBU 27af Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b0 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}"
peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b1 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [gossip.pull] Add -> DEBU 27aa Added 8, total items: 8"
peer0.org1.example.com | "2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b2 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....|
peer0.org1.example.com | 00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|"
peer0.org1.example.com | "2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b3 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry|
peer0.org1.example.com | 00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..|
peer0.org1.example.com | 00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..|
peer0.org1.example.com | 00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d|
peer0.org1.example.com | 00000040 4f b1 ca 9f 55 1a |O...U.|"
peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b4 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b5 validateEndorserTransaction starts for data 0xc0033b8800, header channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" "
peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b6 validateEndorserTransaction info: there are 1 actions"
peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b7 validateEndorserTransaction info: signature header is valid"
peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [protoutils] ValidateTransaction -> DEBU 27b8 ValidateTransactionEnvelope returns err %!s(<nil>)"
peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [committer.txvalidator] validateTx -> DEBU 27b9 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27ba retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]"
peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [committer.txvalidator] validateTx -> DEBU 27bb Validating transaction with plugins"
peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [committer.txvalidator] Dispatch -> DEBU 27bc [businesschannel] Dispatch starts for bytes 0xc002cc8400"
peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27bd constructing new query executor txid = [b343bb2c-5768-4bf7-9e20-81a431852db1]"
peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27be GetState(). ns=_lifecycle, key=namespaces/metadata/exp02"
peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:49.820 UTC [stateleveldb] GetState -> DEBU 27c0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo"
peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo"
peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections"
peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [lockbasedtxmgr] Done -> DEBU 27c3 Done with transaction simulation / query execution [b343bb2c-5768-4bf7-9e20-81a431852db1]"
peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 27c4 Validating Tx f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin"
peer0.org1.example.com | "2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [gossip.comm] Send -> DEBU 27ca Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27c8 constructing new query executor txid = [87dca2fc-7cfd-4504-853a-96c521fa4acf]"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] Done -> DEBU 27cc Done with transaction simulation / query execution [87dca2fc-7cfd-4504-853a-96c521fa4acf]"
peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27cb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [msp] DeserializeIdentity -> DEBU 27cd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func1 -> DEBU 27ce 0xc003902bd0 gate 1556789269824356200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d0 0xc003902bd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d1 0xc003902bd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27d2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:49.825 UTC [cauthdsl] func2 -> DEBU 27d3 0xc003902bd0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d4 Verify: digest = 00000000 7f 4d 0d b0 fb 16 17 0e a9 9b 1c 9e dc 7e 0e e0 |.M...........~..|
peer0.org1.example.com | 00000010 4f 80 fa d3 20 c7 54 c6 87 42 49 9a e9 80 27 a0 |O... .T..BI...'.|"
peer0.org1.example.com | "2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d5 Verify: sig = 00000000 30 45 02 21 00 96 9b ea 15 49 12 69 e6 f6 1e 21 |0E.!.....I.i...!|
peer0.org1.example.com | 00000010 7d f9 18 c3 75 3c 7f 4d 26 d7 18 1b 1c f1 4e 77 |}...u<.M&.....Nw|
peer0.org1.example.com | 00000020 8d 34 c2 7d e6 02 20 1e cf 14 17 97 37 42 5e 2c |.4.}.. .....7B^,|
peer0.org1.example.com | 00000030 3b bc d1 b2 1a f0 61 d0 31 5a 61 8a 6a b1 6d dd |;.....a.1Za.j.m.|
peer0.org1.example.com | 00000040 e6 02 d8 ef 82 6c eb |.....l.|"
peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d6 0xc003902bd0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d7 0xc003902bd0 signed by 1 principal evaluation starts (used [true])"
peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d8 0xc003902bd0 skipping identity 0 because it has already been used"
peer0.org1.example.com | "2019-05-02 09:27:49.846 UTC [cauthdsl] func2 -> DEBU 27d9 0xc003902bd0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:49.847 UTC [cauthdsl] func1 -> DEBU 27da 0xc003902bd0 gate 1556789269824356200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:49.849 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27db constructing new query executor txid = [e2780b94-5445-431b-a318-0bb82f332a66]"
peer0.org1.example.com | "2019-05-02 09:27:49.850 UTC [lockbasedtxmgr] Done -> DEBU 27dc Done with transaction simulation / query execution [e2780b94-5445-431b-a318-0bb82f332a66]"
peer0.org1.example.com | "2019-05-02 09:27:49.850 UTC [vscc] Validate -> DEBU 27dd block 8, namespace: exp02, tx 0 validation results is: <nil>"
peer0.org1.example.com | "2019-05-02 09:27:49.852 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 27de Transaction f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 appears to be valid"
peer0.org1.example.com | "2019-05-02 09:27:49.853 UTC [committer.txvalidator] Dispatch -> DEBU 27df [businesschannel] Dispatch completes env bytes 0xc002cc8400"
peer0.org1.example.com | "2019-05-02 09:27:49.855 UTC [committer.txvalidator] validateTx -> DEBU 27e0 [businesschannel] validateTx completes for block 0xc0045e0380 env 0xc00443aaf0 txn 0"
peer0.org1.example.com | "2019-05-02 09:27:49.856 UTC [committer.txvalidator] Validate -> DEBU 27e1 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:27:49.858 UTC [committer.txvalidator] Validate -> INFO 27e2 [businesschannel] Validated block [8] in 44ms"
peer0.org1.example.com | "2019-05-02 09:27:49.858 UTC [gossip.privdata] listMissingPrivateData -> DEBU 27e3 Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:27:49.859 UTC [gossip.privdata] StoreBlock -> DEBU 27e4 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [kvledger] CommitWithPvtData -> DEBU 27e5 [businesschannel] Validating state for block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e6 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e7 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e8 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27e9 ValidateAndPrepareBatch() for block number = [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27ea preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [valimpl] preprocessProtoBlock -> DEBU 27eb txType=ENDORSER_TRANSACTION"
peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [stateleveldb] GetState -> DEBU 27ec GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [statebasedval] validateKVRead -> DEBU 27ed Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27ee GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27ef Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27f0 GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27f1 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [stateleveldb] GetState -> DEBU 27f2 GetState(). ns=exp02, key=b"
peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [statebasedval] validateKVRead -> DEBU 27f3 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}"
peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 27f4 Block [8] Transaction index [0] TxId [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] marked as valid by state validator. ContainsPostOrderWrites [false]"
peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [valinternal] ApplyWriteSet -> DEBU 27f5 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003913840), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003913880)}"
peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f6 validating rwset..."
peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f7 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f8 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [kvledger] CommitWithPvtData -> DEBU 27f9 [businesschannel] Committing block [8] to storage"
peer0.org1.example.com | "2019-05-02 09:27:49.865 UTC [ledgerstorage] CommitWithPvtData -> DEBU 27fa Writing block [8] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:27:49.867 UTC [pvtdatastorage] Prepare -> DEBU 27fb Saved 0 private data write sets for block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fc Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets=
peer0.org1.example.com | txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fd Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to txid-index"
peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fe Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx number:[0] ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:27:49.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 27ff Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98673], isChainEmpty=[false], lastBlockNumber=[8]"
peer0.org1.example.com | "2019-05-02 09:27:49.871 UTC [pvtdatastorage] Commit -> DEBU 2800 Committing private data for block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [pvtdatastorage] Commit -> DEBU 2801 Committed private data for block [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [kvledger] CommitWithPvtData -> DEBU 2802 [businesschannel] Committing block [8] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2803 lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2804 Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2805 Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [lockbasedtxmgr] Commit -> DEBU 2806 Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2807 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]"
peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2808 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]"
peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] Commit -> DEBU 2809 Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280a Preparing potential purge list working-set for expiringAtBlk [9]"
peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [leveldbhelper] GetIterator -> DEBU 280c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] func1 -> DEBU 280b launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [kvledger] CommitWithPvtData -> DEBU 280e [businesschannel] Committing block [8] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280d No expiry entry found for expiringAtBlk [9]"
peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [historyleveldb] Commit -> DEBU 280f Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:27:49.881 UTC [historyleveldb] Commit -> DEBU 2810 Channel [businesschannel]: Updates committed to history database for blockNo [8]"
peer0.org1.example.com | "2019-05-02 09:27:49.881 UTC [kvledger] CommitWithPvtData -> INFO 2811 [businesschannel] Committed block [8] with 1 transaction(s) in 21ms (state_validation=4ms block_commit=9ms state_commit=4ms)"
peer0.org1.example.com | "2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2812 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020809 "
peer0.org1.example.com | "2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2813 Sign: digest: A621B06F03D34A0674B18CFCA8E22E1A10C61FB115DB21B02C16B6FB5ED84533 "
peer0.org1.example.com | "2019-05-02 09:27:49.883 UTC [gossip.state] commitBlock -> DEBU 2814 [businesschannel] Committed block [8] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [endorser] ProcessProposal -> DEBU 2815 Entering: request from 172.18.0.8:57370"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] ValidateProposalMessage -> DEBU 2816 ValidateProposalMessage starts for signed proposal 0xc0038488c0"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] validateChannelHeader -> DEBU 2817 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 2818 begin"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [msp] GetManagerForChain -> DEBU 2819 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 281a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [protoutils] checkSignatureFromCreator -> DEBU 281b creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....|
peer0.org1.example.com | 00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|"
peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.|
peer0.org1.example.com | 00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z|
peer0.org1.example.com | 00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....|
peer0.org1.example.com | 00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..|
peer0.org1.example.com | 00000040 07 16 be 7d c3 24 |...}.$|"
peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] checkSignatureFromCreator -> DEBU 281e exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 281f validateChaincodeProposalMessage starts for proposal 0xc003168850, header 0xc003848cd0"
peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2820 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [endorser] preProcess -> DEBU 2821 [businesschannel][64069c4c] processing txid: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a"
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2822 retrieveTransactionByID() - txId = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]"
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2823 acl policy /Channel/Application/Writers found in config for resource peer/Propose"
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2824 acl check(/Channel/Application/Writers)"
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2825 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2826 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [policies] Evaluate -> DEBU 2827 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers =="
peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func1 -> DEBU 2828 0xc0038446d0 gate 1556789270193171500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 2829 0xc0038446d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 282a 0xc0038446d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [cauthdsl] func2 -> DEBU 282b 0xc0038446d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....|
peer0.org1.example.com | 00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|"
peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.|
peer0.org1.example.com | 00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z|
peer0.org1.example.com | 00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....|
peer0.org1.example.com | 00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..|
peer0.org1.example.com | 00000040 07 16 be 7d c3 24 |...}.$|"
peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [cauthdsl] func2 -> DEBU 282e 0xc0038446d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [cauthdsl] func1 -> DEBU 282f 0xc0038446d0 gate 1556789270193171500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [policies] Evaluate -> DEBU 2830 Signature set satisfies policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2832 Signature set satisfies policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2833 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2834 constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2835 constructing new tx simulator txid = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]"
peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [endorser] SimulateProposal -> DEBU 2836 [businesschannel][64069c4c] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2837 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [endorser] callChaincode -> INFO 2838 [businesschannel][64069c4c] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2839 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence"
peer0.org1.example.com | "2019-05-02 09:27:50.198 UTC [stateleveldb] GetState -> DEBU 283a GetState(). ns=exp02, key=􏿿initialized"
peer0.org1.example.com | "2019-05-02 09:27:50.198 UTC [chaincode] Execute -> DEBU 283b Entry"
peer0.org1.example.com | "2019-05-02 09:27:50.201 UTC [chaincode] handleMessage -> DEBU 283c [64069c4c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready"
peer0.org1.example.com | "2019-05-02 09:27:50.201 UTC [chaincode] HandleTransaction -> DEBU 283d [64069c4c] handling GET_STATE from chaincode"
peer0.org1.example.com | "2019-05-02 09:27:50.202 UTC [chaincode] HandleGetState -> DEBU 283e [64069c4c] getting state for chaincode exp02, key a, channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.202 UTC [stateleveldb] GetState -> DEBU 283f GetState(). ns=exp02, key=a"
peer0.org1.example.com | "2019-05-02 09:27:50.203 UTC [chaincode] HandleTransaction -> DEBU 2840 [64069c4c] Completed GET_STATE. Sending RESPONSE"
peer0.org1.example.com | "2019-05-02 09:27:50.205 UTC [chaincode] handleMessage -> DEBU 2841 [64069c4c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:50.205 UTC [chaincode] Notify -> DEBU 2842 [64069c4c] notifying Txid:64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [chaincode] Execute -> DEBU 2843 Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] callChaincode -> INFO 2844 [businesschannel][64069c4c] Exit chaincode: name:"exp02" (9ms)"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2845 Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] Done -> DEBU 2846 Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] SimulateProposal -> DEBU 2847 [businesschannel][64069c4c] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] endorseProposal -> DEBU 2848 [businesschannel][64069c4c] Entry chaincode: name:"exp02" "
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 2849 [businesschannel][64069c4c] escc for chaincode name:"exp02" is escc"
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284b Sign: plaintext: 0A20CFB7F550DAC8D829265B6FF08392...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284c Sign: digest: 4B1EDB0672B51A00EF0208881946EB8E3F8CD03514D6A3F4407522E2E3ADF5CE "
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284d Exiting {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}"
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 284e [businesschannel][64069c4c] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [lockbasedtxmgr] Done -> DEBU 284f Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]"
peer0.org1.example.com | "2019-05-02 09:27:50.208 UTC [endorser] func1 -> DEBU 2850 Exit: request from 172.18.0.8:57370"
peer0.org1.example.com | "2019-05-02 09:27:50.208 UTC [comm.grpc.server] 1 -> INFO 2851 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57370 grpc.code=OK grpc.call_duration=19.3263ms
peer0.org1.example.com | "2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2852 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2853 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:50.761 UTC [endorser] ProcessProposal -> DEBU 2854 Entering: request from 172.18.0.8:57374"
peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] ValidateProposalMessage -> DEBU 2855 ValidateProposalMessage starts for signed proposal 0xc0038495e0"
peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] validateChannelHeader -> DEBU 2856 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 begin"
peer0.org1.example.com | "2019-05-02 09:27:50.763 UTC [msp] GetManagerForChain -> DEBU 2858 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:50.763 UTC [protoutils] checkSignatureFromCreator -> DEBU 2859 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:50.764 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:50.764 UTC [msp.identity] Verify -> DEBU 285b Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.|
peer0.org1.example.com | 00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|"
peer0.org1.example.com | "2019-05-02 09:27:50.765 UTC [msp.identity] Verify -> DEBU 285c Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..|
peer0.org1.example.com | 00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y|
peer0.org1.example.com | 00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..|
peer0.org1.example.com | 00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....|
peer0.org1.example.com | 00000040 10 fd 42 a9 42 45 |..B.BE|"
peer0.org1.example.com | "2019-05-02 09:27:50.765 UTC [protoutils] checkSignatureFromCreator -> DEBU 285d exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285e validateChaincodeProposalMessage starts for proposal 0xc003168af0, header 0xc0038499f0"
peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285f validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [endorser] preProcess -> DEBU 2860 [businesschannel][24104060] processing txid: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f"
peer0.org1.example.com | "2019-05-02 09:27:50.767 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2861 retrieveTransactionByID() - txId = [241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f]"
peer0.org1.example.com | "2019-05-02 09:27:50.767 UTC [endorser] SimulateProposal -> DEBU 2862 [businesschannel][24104060] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.768 UTC [endorser] callChaincode -> INFO 2863 [businesschannel][24104060] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.768 UTC [chaincode] Execute -> DEBU 2864 Entry"
peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [qscc] Invoke -> DEBU 2865 Invoke function: GetChainInfo on chain: businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2866 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo"
peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2867 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2869 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [policies] Evaluate -> DEBU 286a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func1 -> DEBU 286b 0xc0037d54e0 gate 1556789270770402200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286c 0xc0037d54e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286d 0xc0037d54e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 286e 0xc0037d54e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 286f Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.|
peer0.org1.example.com | 00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|"
peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 2870 Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..|
peer0.org1.example.com | 00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y|
peer0.org1.example.com | 00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..|
peer0.org1.example.com | 00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....|
peer0.org1.example.com | 00000040 10 fd 42 a9 42 45 |..B.BE|"
peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 2871 0xc0037d54e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [cauthdsl] func1 -> DEBU 2872 0xc0037d54e0 gate 1556789270770402200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2873 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2874 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2875 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2876 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] handleMessage -> DEBU 2877 [24104060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] Notify -> DEBU 2878 [24104060] notifying Txid:241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] Execute -> DEBU 2879 Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [endorser] callChaincode -> INFO 287a [businesschannel][24104060] Exit chaincode: name:"qscc" (5ms)"
peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] SimulateProposal -> DEBU 287b [businesschannel][24104060] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287c [businesschannel][24104060] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287d [businesschannel][24104060] escc for chaincode name:"qscc" is escc"
peer0.org1.example.com | "2019-05-02 09:27:50.775 UTC [endorser] EndorseWithPlugin -> DEBU 287e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}"
peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 287f Sign: plaintext: 0A209B70645B41BEAE595688F2AD0075...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 2880 Sign: digest: EA378FB334945ABB2C73BB8C79377341F8B4B5298502586042935902DFB47468 "
peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [endorser] EndorseWithPlugin -> DEBU 2881 Exiting {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}"
peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [endorser] endorseProposal -> DEBU 2882 [businesschannel][24104060] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.777 UTC [endorser] func1 -> DEBU 2883 Exit: request from 172.18.0.8:57374"
peer0.org1.example.com | "2019-05-02 09:27:50.777 UTC [comm.grpc.server] 1 -> INFO 2884 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57374 grpc.code=OK grpc.call_duration=15.5943ms
peer0.org1.example.com | "2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2885 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2886 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [endorser] ProcessProposal -> DEBU 2887 Entering: request from 172.18.0.8:57378"
peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [protoutils] ValidateProposalMessage -> DEBU 2888 ValidateProposalMessage starts for signed proposal 0xc0037ceb40"
peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [protoutils] validateChannelHeader -> DEBU 2889 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288a begin"
peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [msp] GetManagerForChain -> DEBU 288b Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288d creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288e Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......|
peer0.org1.example.com | 00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|"
peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288f Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..|
peer0.org1.example.com | 00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F|
peer0.org1.example.com | 00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....|
peer0.org1.example.com | 00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e|
peer0.org1.example.com | 00000040 86 57 05 3f f6 ca 5f |.W.?.._|"
peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [protoutils] checkSignatureFromCreator -> DEBU 2890 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2891 validateChaincodeProposalMessage starts for proposal 0xc003168e00, header 0xc0037ceff0"
peer0.org1.example.com | "2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2892 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] preProcess -> DEBU 2893 [businesschannel][2df4e9c0] processing txid: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44"
peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2894 retrieveTransactionByID() - txId = [2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44]"
peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] SimulateProposal -> DEBU 2895 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] callChaincode -> INFO 2896 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [chaincode] Execute -> DEBU 2897 Entry"
peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [qscc] Invoke -> DEBU 2898 Invoke function: GetBlockByNumber on chain: businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 2899 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber"
peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 289a acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [policies] Evaluate -> DEBU 289b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func1 -> DEBU 289e 0xc003774f70 gate 1556789270977536800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 289f 0xc003774f70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 28a0 0xc003774f70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [cauthdsl] func2 -> DEBU 28a1 0xc003774f70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a2 Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......|
peer0.org1.example.com | 00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|"
peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a3 Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..|
peer0.org1.example.com | 00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F|
peer0.org1.example.com | 00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....|
peer0.org1.example.com | 00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e|
peer0.org1.example.com | 00000040 86 57 05 3f f6 ca 5f |.W.?.._|"
peer0.org1.example.com | "2019-05-02 09:27:50.979 UTC [cauthdsl] func2 -> DEBU 28a4 0xc003774f70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:50.979 UTC [cauthdsl] func1 -> DEBU 28a5 0xc003774f70 gate 1556789270977536800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a6 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a8 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:50.981 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 28aa retrieveBlockByNumber() - blockNum = [2]"
peer0.org1.example.com | "2019-05-02 09:27:50.981 UTC [fsblkstorage] newBlockfileStream -> DEBU 28ab newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]"
peer0.org1.example.com | "2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ac Remaining bytes=[51047], Going to peek [8] bytes"
peer0.org1.example.com | "2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ad Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}"
peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] handleMessage -> DEBU 28ae [2df4e9c0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] Notify -> DEBU 28af [2df4e9c0] notifying Txid:2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] Execute -> DEBU 28b0 Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.984 UTC [endorser] callChaincode -> INFO 28b1 [businesschannel][2df4e9c0] Exit chaincode: name:"qscc" (9ms)"
peer0.org1.example.com | "2019-05-02 09:27:50.984 UTC [endorser] SimulateProposal -> DEBU 28b2 [businesschannel][2df4e9c0] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b3 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b4 [businesschannel][2df4e9c0] escc for chaincode name:"qscc" is escc"
peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [endorser] EndorseWithPlugin -> DEBU 28b5 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}"
peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b6 Sign: plaintext: 0A2016059D49945D8C7832B1426637D1...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b7 Sign: digest: 828A231ABBC2A984BCFA1D369556CD17EF40D394F97964C1C6EE762582FD7EF5 "
peer0.org1.example.com | "2019-05-02 09:27:50.987 UTC [endorser] EndorseWithPlugin -> DEBU 28b8 Exiting {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}"
peer0.org1.example.com | "2019-05-02 09:27:50.987 UTC [endorser] endorseProposal -> DEBU 28b9 [businesschannel][2df4e9c0] Exit"
peer0.org1.example.com | "2019-05-02 09:27:50.988 UTC [endorser] func1 -> DEBU 28ba Exit: request from 172.18.0.8:57378"
peer0.org1.example.com | "2019-05-02 09:27:50.988 UTC [comm.grpc.server] 1 -> INFO 28bb unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57378 grpc.code=OK grpc.call_duration=17.2875ms
peer0.org1.example.com | "2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bc transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bd transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [endorser] ProcessProposal -> DEBU 28be Entering: request from 172.18.0.8:57382"
peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] ValidateProposalMessage -> DEBU 28bf ValidateProposalMessage starts for signed proposal 0xc0037cff90"
peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] validateChannelHeader -> DEBU 28c0 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c1 begin"
peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp] GetManagerForChain -> DEBU 28c2 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c4 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c5 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..|
peer0.org1.example.com | 00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|"
peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c6 Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.|
peer0.org1.example.com | 00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..|
peer0.org1.example.com | 00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........|
peer0.org1.example.com | 00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....|
peer0.org1.example.com | 00000040 65 dc 7f ea 7c 97 17 |e...|..|"
peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c7 exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c8 validateChaincodeProposalMessage starts for proposal 0xc0031690a0, header 0xc003758410"
peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [endorser] preProcess -> DEBU 28ca [businesschannel][a97e4d2e] processing txid: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a"
peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28cb retrieveTransactionByID() - txId = [a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a]"
peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [endorser] SimulateProposal -> DEBU 28cc [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [endorser] callChaincode -> INFO 28cd [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [chaincode] Execute -> DEBU 28ce Entry"
peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [cscc] Invoke -> DEBU 28cf Invoke function: GetConfigBlock"
peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d0 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock"
peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d1 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [policies] Evaluate -> DEBU 28d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func1 -> DEBU 28d5 0xc0036f6b30 gate 1556789271512089500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d6 0xc0036f6b30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d7 0xc0036f6b30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d8 0xc0036f6b30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [msp.identity] Verify -> DEBU 28d9 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..|
peer0.org1.example.com | 00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|"
peer0.org1.example.com | "2019-05-02 09:27:51.513 UTC [msp.identity] Verify -> DEBU 28da Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.|
peer0.org1.example.com | 00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..|
peer0.org1.example.com | 00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........|
peer0.org1.example.com | 00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....|
peer0.org1.example.com | 00000040 65 dc 7f ea 7c 97 17 |e...|..|"
peer0.org1.example.com | "2019-05-02 09:27:51.513 UTC [cauthdsl] func2 -> DEBU 28db 0xc0036f6b30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [cauthdsl] func1 -> DEBU 28dc 0xc0036f6b30 gate 1556789271512089500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28df Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] handleMessage -> DEBU 28e1 [a97e4d2e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] Notify -> DEBU 28e2 [a97e4d2e] notifying Txid:a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] Execute -> DEBU 28e3 Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [endorser] callChaincode -> INFO 28e4 [businesschannel][a97e4d2e] Exit chaincode: name:"cscc" (6ms)"
peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [endorser] SimulateProposal -> DEBU 28e5 [businesschannel][a97e4d2e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e6 [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e7 [businesschannel][a97e4d2e] escc for chaincode name:"cscc" is escc"
peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] EndorseWithPlugin -> DEBU 28e8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28e9 Sign: plaintext: 0A2048A4F3E80B8107BCA08ABF3A0D82...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28ea Sign: digest: 53473CFF231C4119BEB7B7FF9D6F26836A77AC913801EEE2176514D99C80BF06 "
peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] EndorseWithPlugin -> DEBU 28eb Exiting {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] endorseProposal -> DEBU 28ec [businesschannel][a97e4d2e] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] func1 -> DEBU 28ed Exit: request from 172.18.0.8:57382"
peer0.org1.example.com | "2019-05-02 09:27:51.518 UTC [comm.grpc.server] 1 -> INFO 28ee unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57382 grpc.code=OK grpc.call_duration=12.6023ms
peer0.org1.example.com | "2019-05-02 09:27:51.523 UTC [grpc] infof -> DEBU 28ef transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.524 UTC [grpc] infof -> DEBU 28f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [endorser] ProcessProposal -> DEBU 28f1 Entering: request from 172.18.0.8:57386"
peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [protoutils] ValidateProposalMessage -> DEBU 28f2 ValidateProposalMessage starts for signed proposal 0xc003708140"
peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [protoutils] validateChannelHeader -> DEBU 28f3 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f4 begin"
peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [msp] GetManagerForChain -> DEBU 28f5 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f7 creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f8 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0|
peer0.org1.example.com | 00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|"
peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f9 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_|
peer0.org1.example.com | 00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....|
peer0.org1.example.com | 00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.|
peer0.org1.example.com | 00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.|
peer0.org1.example.com | 00000040 d5 04 91 31 1c bc d3 |...1...|"
peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [protoutils] checkSignatureFromCreator -> DEBU 28fa exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fb validateChaincodeProposalMessage starts for proposal 0xc0034605b0, header 0xc003708550"
peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fc validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [endorser] preProcess -> DEBU 28fd [businesschannel][2ef25060] processing txid: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4"
peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fe retrieveTransactionByID() - txId = [2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4]"
peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [endorser] SimulateProposal -> DEBU 28ff [businesschannel][2ef25060] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [endorser] callChaincode -> INFO 2900 [businesschannel][2ef25060] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [chaincode] Execute -> DEBU 2901 Entry"
peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [cscc] Invoke -> DEBU 2902 Invoke function: GetChannels"
peer0.org1.example.com | "2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2903 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0|
peer0.org1.example.com | 00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|"
peer0.org1.example.com | "2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2904 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_|
peer0.org1.example.com | 00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....|
peer0.org1.example.com | 00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.|
peer0.org1.example.com | 00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.|
peer0.org1.example.com | 00000040 d5 04 91 31 1c bc d3 |...1...|"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] handleMessage -> DEBU 2905 [2ef25060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] Notify -> DEBU 2906 [2ef25060] notifying Txid:2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] Execute -> DEBU 2907 Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] callChaincode -> INFO 2908 [businesschannel][2ef25060] Exit chaincode: name:"cscc" (2ms)"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] SimulateProposal -> DEBU 2909 [businesschannel][2ef25060] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] endorseProposal -> DEBU 290a [businesschannel][2ef25060] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [endorser] endorseProposal -> DEBU 290b [businesschannel][2ef25060] escc for chaincode name:"cscc" is escc"
peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [endorser] EndorseWithPlugin -> DEBU 290c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290d Sign: plaintext: 0A206B67B3A204BFF1BC0071B1CC6F8E...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290e Sign: digest: BB4C7619526B2EDADDE7EE15D90E4B8EF6BF124AF765D67673B4AB3D56217E2E "
peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] EndorseWithPlugin -> DEBU 290f Exiting {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] endorseProposal -> DEBU 2910 [businesschannel][2ef25060] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] func1 -> DEBU 2911 Exit: request from 172.18.0.8:57386"
peer0.org1.example.com | "2019-05-02 09:27:51.720 UTC [comm.grpc.server] 1 -> INFO 2912 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57386 grpc.code=OK grpc.call_duration=8.8482ms
peer0.org1.example.com | "2019-05-02 09:27:51.724 UTC [grpc] infof -> DEBU 2913 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.725 UTC [grpc] infof -> DEBU 2914 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [endorser] ProcessProposal -> DEBU 2915 Entering: request from 172.18.0.8:57390"
peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [protoutils] ValidateProposalMessage -> DEBU 2916 ValidateProposalMessage starts for signed proposal 0xc0037094f0"
peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [protoutils] validateChannelHeader -> DEBU 2917 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 2918 begin"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp] GetManagerForChain -> DEBU 2919 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291b creator is valid"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291c Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt|
peer0.org1.example.com | 00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|"
peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291d Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...|
peer0.org1.example.com | 00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.|
peer0.org1.example.com | 00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J|
peer0.org1.example.com | 00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....|
peer0.org1.example.com | 00000040 e9 c9 87 c0 00 2e 69 |......i|"
peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] checkSignatureFromCreator -> DEBU 291e exits successfully"
peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 291f validateChaincodeProposalMessage starts for proposal 0xc003460850, header 0xc003709950"
peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2920 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] preProcess -> DEBU 2921 [businesschannel][3ec1dd6f] processing txid: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306"
peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2922 retrieveTransactionByID() - txId = [3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306]"
peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] SimulateProposal -> DEBU 2923 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] callChaincode -> INFO 2924 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [chaincode] Execute -> DEBU 2925 Entry"
peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [cscc] Invoke -> DEBU 2926 Invoke function: GetConfigTree"
peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2927 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree"
peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2928 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [policies] Evaluate -> DEBU 2929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [cauthdsl] func1 -> DEBU 292c 0xc003543be0 gate 1556789271904780500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [cauthdsl] func2 -> DEBU 292d 0xc003543be0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292e 0xc003543be0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292f 0xc003543be0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2930 Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt|
peer0.org1.example.com | 00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|"
peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2931 Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...|
peer0.org1.example.com | 00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.|
peer0.org1.example.com | 00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J|
peer0.org1.example.com | 00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....|
peer0.org1.example.com | 00000040 e9 c9 87 c0 00 2e 69 |......i|"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [cauthdsl] func2 -> DEBU 2932 0xc003543be0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [cauthdsl] func1 -> DEBU 2933 0xc003543be0 gate 1556789271904780500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] handleMessage -> DEBU 2938 [3ec1dd6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] Notify -> DEBU 2939 [3ec1dd6f] notifying Txid:3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, channelID:businesschannel"
peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] Execute -> DEBU 293a Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] callChaincode -> INFO 293b [businesschannel][3ec1dd6f] Exit chaincode: name:"cscc" (5ms)"
peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] SimulateProposal -> DEBU 293c [businesschannel][3ec1dd6f] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] endorseProposal -> DEBU 293d [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] endorseProposal -> DEBU 293e [businesschannel][3ec1dd6f] escc for chaincode name:"cscc" is escc"
peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 293f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2940 Sign: plaintext: 0A209037445891E6447F4E4A5C737046...455254494649434154452D2D2D2D2D0A "
peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2941 Sign: digest: 1C1F089306B22C542D72A6549BEF042EE439AC16B533273D756DD1C2B691BF6E "
peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 2942 Exiting {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}"
peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [endorser] endorseProposal -> DEBU 2943 [businesschannel][3ec1dd6f] Exit"
peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [endorser] func1 -> DEBU 2944 Exit: request from 172.18.0.8:57390"
peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [comm.grpc.server] 1 -> INFO 2945 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57390 grpc.code=OK grpc.call_duration=11.0778ms
peer0.org1.example.com | "2019-05-02 09:27:51.914 UTC [grpc] infof -> DEBU 2946 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:51.915 UTC [grpc] infof -> DEBU 2947 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2948 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2949 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.248 UTC [gossip.comm] Send -> DEBU 294a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.251 UTC [gossip.comm] sendToEndpoint -> DEBU 2950 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [gossip.comm] func1 -> DEBU 2951 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [gossip.gossip] handleMessage -> DEBU 2952 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp] DeserializeIdentity -> DEBU 2953 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2954 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....|
peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|"
peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2955 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj|
peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<|
peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&|
peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..|
peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2956 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2957 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2958 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2959 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 295a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 295b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [gossip.comm] Send -> DEBU 295e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [msp] DeserializeIdentity -> DEBU 2960 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2961 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2962 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2963 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2964 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2965 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2966 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2967 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.258 UTC [policies] Evaluate -> DEBU 2968 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2969 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 296a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 296b 0xc003444a40 gate 1556789272278231700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296c 0xc003444a40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296d 0xc003444a40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296e 0xc003444a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296f 0xc003444a40 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2970 0xc003444a40 gate 1556789272278231700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2971 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2973 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2974 0xc003445290 gate 1556789272278689800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 2975 0xc003445290 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2976 0xc003445290 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2977 0xc003445290 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2978 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2979 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 297a 0xc003445290 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func1 -> DEBU 297b 0xc003445290 gate 1556789272278689800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2980 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2981 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2982 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2983 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2984 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 2985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2988 0xc003428aa0 gate 1556789272280100100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2989 0xc003428aa0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298a 0xc003428aa0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298b 0xc003428aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298c 0xc003428aa0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 298d 0xc003428aa0 gate 1556789272280100100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2990 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2991 0xc003429420 gate 1556789272280452300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2992 0xc003429420 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2993 0xc003429420 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2994 0xc003429420 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2995 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2996 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2997 0xc003429420 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2998 0xc003429420 gate 1556789272280452300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2999 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp] DeserializeIdentity -> DEBU 299d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a3 0xc0033f8600 gate 1556789272281280100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a4 0xc0033f8600 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a5 0xc0033f8600 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a6 0xc0033f8600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a7 0xc0033f8600 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a8 0xc0033f8600 gate 1556789272281280100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29ac 0xc0033f8e70 gate 1556789272281606900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ad 0xc0033f8e70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ae 0xc0033f8e70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29af 0xc0033f8e70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b0 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b1 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29b2 0xc0033f8e70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [cauthdsl] func1 -> DEBU 29b3 0xc0033f8e70 gate 1556789272281606900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bb Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....|
peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bc Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj|
peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<|
peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&|
peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..|
peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bd Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..|
peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29be Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....|
peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9|
peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s|
peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...|
peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|"
peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29bf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29c7 0xc0033d9c60 gate 1556789272283411600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0033d9c60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c9 0xc0033d9c60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29ca 0xc0033d9c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29cb 0xc0033d9c60 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29cc 0xc0033d9c60 gate 1556789272283411600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29d0 0xc0033ca4a0 gate 1556789272283751800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d1 0xc0033ca4a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d2 0xc0033ca4a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d3 0xc0033ca4a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d4 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.|
peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|"
peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d5 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. |
peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3|
peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$|
peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E|
peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|"
peer0.org1.example.com | "2019-05-02 09:27:52.292 UTC [cauthdsl] func2 -> DEBU 29d6 0xc0033ca4a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.292 UTC [cauthdsl] func1 -> DEBU 29d7 0xc0033ca4a0 gate 1556789272283751800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.295 UTC [policies] Evaluate -> DEBU 29da Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.296 UTC [policies] Evaluate -> DEBU 29db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.297 UTC [msp] DeserializeIdentity -> DEBU 29dc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.298 UTC [msp] DeserializeIdentity -> DEBU 29dd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29df Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e0 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.303 UTC [policies] Evaluate -> DEBU 29e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func1 -> DEBU 29e4 0xc0033cbcd0 gate 1556789272306047300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e5 0xc0033cbcd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e6 0xc0033cbcd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e7 0xc0033cbcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0033cbcd0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29e9 0xc0033cbcd0 gate 1556789272306047300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29ed 0xc0032f4720 gate 1556789272307897900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ee 0xc0032f4720 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ef 0xc0032f4720 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f0 0xc0032f4720 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f1 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f2 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f3 0xc0032f4720 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func1 -> DEBU 29f4 0xc0032f4720 gate 1556789272307897900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp] DeserializeIdentity -> DEBU 29f9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fa Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [cauthdsl] func1 -> DEBU 29ff 0xc0032f5810 gate 1556789272309496700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [cauthdsl] func2 -> DEBU 2a00 0xc0032f5810 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.311 UTC [cauthdsl] func2 -> DEBU 2a01 0xc0032f5810 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a02 0xc0032f5810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a03 0xc0032f5810 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [cauthdsl] func1 -> DEBU 2a04 0xc0032f5810 gate 1556789272309496700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [policies] Evaluate -> DEBU 2a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func1 -> DEBU 2a08 0xc0032b4060 gate 1556789272314300100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a09 0xc0032b4060 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc0032b4060 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0b 0xc0032b4060 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0c Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0d Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:52.316 UTC [gossip.election] waitForInterrupt -> DEBU 2a0e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.317 UTC [gossip.election] IsLeader -> DEBU 2a0f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:52.317 UTC [msp.identity] Sign -> DEBU 2a10 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510081801 "
peer0.org1.example.com | "2019-05-02 09:27:52.318 UTC [msp.identity] Sign -> DEBU 2a11 Sign: digest: 094146C0F2228C9D7DB4175481F7A1B1DDF73F04769F4BD9E74919884DB59756 "
peer0.org1.example.com | "2019-05-02 09:27:52.319 UTC [gossip.election] waitForInterrupt -> DEBU 2a12 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a14 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a15 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a16 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] Send -> DEBU 2a17 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a18 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a19 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.320 UTC [cauthdsl] func2 -> DEBU 2a1c 0xc0032b4060 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.327 UTC [cauthdsl] func1 -> DEBU 2a1d 0xc0032b4060 gate 1556789272314300100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.327 UTC [policies] Evaluate -> DEBU 2a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a20 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a22 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a23 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a24 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....|
peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a25 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj|
peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<|
peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&|
peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..|
peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a26 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a27 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a28 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a29 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a2a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func1 -> DEBU 2a2e 0xc003108280 gate 1556789272335306700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a2f 0xc003108280 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a30 0xc003108280 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a31 0xc003108280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a32 0xc003108280 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a33 0xc003108280 gate 1556789272335306700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a34 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a37 0xc003108ac0 gate 1556789272336935700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a38 0xc003108ac0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a39 0xc003108ac0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3a 0xc003108ac0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3b Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p|
peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3c Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H|
peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N|
peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R|
peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.|
peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3d 0xc003108ac0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func1 -> DEBU 2a3e 0xc003108ac0 gate 1556789272336935700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a3f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a41 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a43 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a46 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a47 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a4b 0xc00301a410 gate 1556789272338052200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc00301a410 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4d 0xc00301a410 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4e 0xc00301a410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4f 0xc00301a410 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a50 0xc00301a410 gate 1556789272338052200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a54 0xc00301ac50 gate 1556789272338501400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a55 0xc00301ac50 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a56 0xc00301ac50 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a57 0xc00301ac50 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a58 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.|
peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|"
peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a59 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. |
peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3|
peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$|
peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E|
peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [cauthdsl] func2 -> DEBU 2a5a 0xc00301ac50 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [cauthdsl] func1 -> DEBU 2a5b 0xc00301ac50 gate 1556789272338501400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a60 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a61 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a62 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a63 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func1 -> DEBU 2a67 0xc002f84350 gate 1556789272340508100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a68 0xc002f84350 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a69 0xc002f84350 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a6a 0xc002f84350 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6b Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [cauthdsl] func2 -> DEBU 2a6d 0xc002f84350 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [cauthdsl] func1 -> DEBU 2a6e 0xc002f84350 gate 1556789272340508100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a6f Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a71 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.343 UTC [gossip.gossip] handleMessage -> DEBU 2a73 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.391 UTC [gossip.gossip] handleMessage -> DEBU 2a74 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a75 Got message: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.392 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:52.393 UTC [msp.identity] Verify -> DEBU 2a77 Verify: digest = 00000000 3f f3 7b 01 4b 67 e4 ae d4 80 79 f9 d5 b1 2b e4 |?.{.Kg....y...+.|
peer0.org1.example.com | 00000010 0c 6f 9d 0c 3c 63 0a b4 63 94 de 7f 92 56 fb 0d |.o..<c..c....V..|"
peer0.org1.example.com | "2019-05-02 09:27:52.393 UTC [msp.identity] Verify -> DEBU 2a78 Verify: sig = 00000000 30 45 02 21 00 be 57 96 1e ac ab f2 00 a2 c6 b4 |0E.!..W.........|
peer0.org1.example.com | 00000010 e4 37 61 4e a9 c2 4a 6b 5a cc e8 c7 46 c0 9e 58 |.7aN..JkZ...F..X|
peer0.org1.example.com | 00000020 ef e6 e3 40 f2 02 20 1b f5 cb 8b 68 ab 00 1c 9f |...@.. ....h....|
peer0.org1.example.com | 00000030 f0 31 0f 0e c5 b9 bc f0 65 6f 9f 31 58 53 cf d4 |.1......eo.1XS..|
peer0.org1.example.com | 00000040 d2 3b d1 8f fa 22 6e |.;..."n|"
peer0.org1.example.com | "2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a79 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a7a Verify: sig = 00000000 30 44 02 20 0c 06 0f 84 b0 9e 4f e5 d1 98 3d 7a |0D. ......O...=z|
peer0.org1.example.com | 00000010 d1 0e d7 8d e4 4c 4c 6e 83 91 b6 d9 ee 11 48 02 |.....LLn......H.|
peer0.org1.example.com | 00000020 ee 00 97 4b 02 20 0b 54 fc ee 22 eb 98 0b 50 b1 |...K. .T.."...P.|
peer0.org1.example.com | 00000030 05 35 52 2e 70 a6 c7 11 be ca 1a 57 b7 75 49 8f |.5R.p......W.uI.|
peer0.org1.example.com | 00000040 a7 03 ae ab 64 57 |....dW|"
peer0.org1.example.com | "2019-05-02 09:27:52.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a7b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.395 UTC [gossip.discovery] sendMemResponse -> DEBU 2a7c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [gossip.comm] Send -> DEBU 2a7f Entering, sending GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [gossip.discovery] sendMemResponse -> DEBU 2a80 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a82 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.gossip] handleMessage -> DEBU 2a83 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.504 UTC [gossip.gossip] handleMessage -> DEBU 2a84 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a85 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a86 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.507 UTC [gossip.gossip] handleMessage -> DEBU 2a87 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.518 UTC [gossip.gossip] handleMessage -> DEBU 2a88 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a89 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a8a Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8d Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8e Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:52.524 UTC [msp] DeserializeIdentity -> DEBU 2a8f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.524 UTC [gossip.gossip] handleMessage -> DEBU 2a90 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.530 UTC [gossip.comm] func1 -> DEBU 2a91 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.530 UTC [gossip.gossip] handleMessage -> DEBU 2a92 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a93 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a94 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp] DeserializeIdentity -> DEBU 2a95 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [gossip.gossip] handleMessage -> DEBU 2a96 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.557 UTC [gossip.gossip] handleMessage -> DEBU 2a97 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18280623244546912899 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.558 UTC [gossip.pull] HandleMessage -> DEBU 2a98 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18280623244546912899 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.558 UTC [gossip.pull] SendDigest -> DEBU 2a99 Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:52.559 UTC [gossip.gossip] handleMessage -> DEBU 2a9a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.751 UTC [gossip.gossip] handleMessage -> DEBU 2a9b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.751 UTC [msp] DeserializeIdentity -> DEBU 2a9c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.753 UTC [gossip.gossip] handleMessage -> DEBU 2a9f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.762 UTC [gossip.gossip] handleMessage -> DEBU 2aa0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.766 UTC [msp] DeserializeIdentity -> DEBU 2aa1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aa2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.769 UTC [policies] Evaluate -> DEBU 2aa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.771 UTC [cauthdsl] func1 -> DEBU 2aa8 0xc002ee0090 gate 1556789272770718900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aa9 0xc002ee0090 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aaa 0xc002ee0090 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aab 0xc002ee0090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aac 0xc002ee0090 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func1 -> DEBU 2aad 0xc002ee0090 gate 1556789272770718900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aaf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.773 UTC [policies] Evaluate -> DEBU 2ab0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func1 -> DEBU 2ab1 0xc002ee08d0 gate 1556789272773770200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab2 0xc002ee08d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab3 0xc002ee08d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [cauthdsl] func2 -> DEBU 2ab4 0xc002ee08d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [cauthdsl] func2 -> DEBU 2ab7 0xc002ee08d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [cauthdsl] func1 -> DEBU 2ab8 0xc002ee08d0 gate 1556789272773770200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [policies] Evaluate -> DEBU 2ab9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abb Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.778 UTC [gossip.gossip] handleMessage -> DEBU 2abe Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [gossip.comm] func1 -> DEBU 2abf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [gossip.gossip] handleMessage -> DEBU 2ac0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [policies] Evaluate -> DEBU 2ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [cauthdsl] func1 -> DEBU 2ac8 0xc002ea6590 gate 1556789272784549100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [cauthdsl] func2 -> DEBU 2ac9 0xc002ea6590 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2aca 0xc002ea6590 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acb 0xc002ea6590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acc 0xc002ea6590 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [cauthdsl] func1 -> DEBU 2acd 0xc002ea6590 gate 1556789272784549100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc002ea6f00 gate 1556789272787102400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc002ea6f00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc002ea6f00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc002ea6f00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU 2ad7 0xc002ea6f00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func1 -> DEBU 2ad8 0xc002ea6f00 gate 1556789272787102400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.790 UTC [policies] Evaluate -> DEBU 2ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.791 UTC [policies] Evaluate -> DEBU 2ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adb Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [msp] DeserializeIdentity -> DEBU 2add Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.793 UTC [gossip.gossip] handleMessage -> DEBU 2ade Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.815 UTC [gossip.comm] func1 -> DEBU 2adf Got message: GossipMessage: tag:EMPTY hello:<nonce:11299289925435491145 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.815 UTC [gossip.gossip] handleMessage -> DEBU 2ae0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:11299289925435491145 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.818 UTC [gossip.pull] HandleMessage -> DEBU 2ae1 GossipMessage: tag:EMPTY hello:<nonce:11299289925435491145 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.819 UTC [msp] DeserializeIdentity -> DEBU 2ae2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.820 UTC [msp] DeserializeIdentity -> DEBU 2ae3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.823 UTC [gossip.pull] SendDigest -> DEBU 2ae8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:52.823 UTC [gossip.gossip] handleMessage -> DEBU 2ae9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.834 UTC [gossip.comm] func1 -> DEBU 2aea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.834 UTC [gossip.gossip] handleMessage -> DEBU 2aeb Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.835 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.837 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aee Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:52.837 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2af0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af1 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af2 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2af6 0xc002e59910 gate 1556789272843494600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af7 0xc002e59910 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af8 0xc002e59910 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af9 0xc002e59910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2afa 0xc002e59910 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2afb 0xc002e59910 gate 1556789272843494600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [policies] Evaluate -> DEBU 2afc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [cauthdsl] func1 -> DEBU 2aff 0xc002e42170 gate 1556789272847526700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [cauthdsl] func2 -> DEBU 2b00 0xc002e42170 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b01 0xc002e42170 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b02 0xc002e42170 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b03 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......|
peer0.org1.example.com | 00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|"
peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b04 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....|
peer0.org1.example.com | 00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....|
peer0.org1.example.com | 00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.|
peer0.org1.example.com | 00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......|
peer0.org1.example.com | 00000040 72 8c e1 c3 66 83 |r...f.|"
peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [cauthdsl] func2 -> DEBU 2b05 0xc002e42170 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [cauthdsl] func1 -> DEBU 2b06 0xc002e42170 gate 1556789272847526700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [policies] Evaluate -> DEBU 2b07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b09 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b0b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:52.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b10 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b11 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b12 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [gossip.discovery] sendMemResponse -> DEBU 2b13 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [msp] DeserializeIdentity -> DEBU 2b14 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.854 UTC [msp] DeserializeIdentity -> DEBU 2b15 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.855 UTC [msp] DeserializeIdentity -> DEBU 2b16 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.856 UTC [gossip.comm] Send -> DEBU 2b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:52.857 UTC [gossip.discovery] sendMemResponse -> DEBU 2b18 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b19 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b1a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.983 UTC [gossip.comm] func1 -> DEBU 2b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.984 UTC [gossip.gossip] handleMessage -> DEBU 2b1c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.985 UTC [msp] DeserializeIdentity -> DEBU 2b1d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [gossip.gossip] handleMessage -> DEBU 2b20 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [gossip.comm] func1 -> DEBU 2b21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [gossip.gossip] handleMessage -> DEBU 2b22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [msp] DeserializeIdentity -> DEBU 2b23 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b25 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b26 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [policies] Evaluate -> DEBU 2b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func1 -> DEBU 2b2a 0xc002e174f0 gate 1556789272995559700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2b 0xc002e174f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2c 0xc002e174f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2d 0xc002e174f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc002e174f0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func1 -> DEBU 2b2f 0xc002e174f0 gate 1556789272995559700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [policies] Evaluate -> DEBU 2b30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func1 -> DEBU 2b33 0xc002e17ef0 gate 1556789272997487300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b34 0xc002e17ef0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b35 0xc002e17ef0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [cauthdsl] func2 -> DEBU 2b36 0xc002e17ef0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b37 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b38 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [cauthdsl] func2 -> DEBU 2b39 0xc002e17ef0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc002e17ef0 gate 1556789272997487300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [policies] Evaluate -> DEBU 2b3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [msp] DeserializeIdentity -> DEBU 2b3f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.001 UTC [gossip.gossip] handleMessage -> DEBU 2b40 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.005 UTC [msp] DeserializeIdentity -> DEBU 2b41 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b42 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [gossip.pull] Hello -> DEBU 2b43 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b44 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [msp] DeserializeIdentity -> DEBU 2b45 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [gossip.comm] Send -> DEBU 2b46 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15349309374599361185 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [gossip.comm] sendToEndpoint -> DEBU 2b47 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15349309374599361185 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.008 UTC [gossip.comm] sendToEndpoint -> DEBU 2b48 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.010 UTC [gossip.gossip] handleMessage -> DEBU 2b49 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.011 UTC [gossip.pull] HandleMessage -> DEBU 2b4a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.011 UTC [gossip.gossip] handleMessage -> DEBU 2b4b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.099 UTC [gossip.gossip] handleMessage -> DEBU 2b4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:17504088196653699553 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.100 UTC [gossip.pull] Hello -> DEBU 2b4d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:53.100 UTC [gossip.pull] HandleMessage -> DEBU 2b4e GossipMessage: tag:EMPTY hello:<nonce:17504088196653699553 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.101 UTC [gossip.pull] SendDigest -> DEBU 2b4f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:53.101 UTC [gossip.gossip] handleMessage -> DEBU 2b50 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b51 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4201595857500789673 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b52 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b53 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7835840832422763451 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4201595857500789673 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b55 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7835840832422763451 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b57 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b58 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:53.104 UTC [gossip.comm] Send -> DEBU 2b59 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17072324767179249031 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.pull] HandleMessage -> DEBU 2b5b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b5d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17072324767179249031 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.gossip] handleMessage -> DEBU 2b5e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.pull] HandleMessage -> DEBU 2b5f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.108 UTC [gossip.gossip] handleMessage -> DEBU 2b60 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b61 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.114 UTC [gossip.comm] func1 -> DEBU 2b62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.114 UTC [gossip.gossip] handleMessage -> DEBU 2b63 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.115 UTC [gossip.pull] HandleMessage -> DEBU 2b64 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.115 UTC [gossip.gossip] handleMessage -> DEBU 2b65 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b66 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b67 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b69 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6a Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..|
peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|"
peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6b Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."|
peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..|
peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o|
peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o|
peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|"
peer0.org1.example.com | "2019-05-02 09:27:53.121 UTC [msp.identity] Verify -> DEBU 2b6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:53.122 UTC [msp.identity] Verify -> DEBU 2b6d Verify: sig = 00000000 30 45 02 21 00 9d 65 6d 7f 52 4d f0 0d da 17 96 |0E.!..em.RM.....|
peer0.org1.example.com | 00000010 18 3d 48 25 85 ca 9b b8 3b ee 4b 9b 8b b3 f0 dd |.=H%....;.K.....|
peer0.org1.example.com | 00000020 82 7c d8 26 55 02 20 54 f4 de 62 3a 11 23 31 57 |.|.&U. T..b:.#1W|
peer0.org1.example.com | 00000030 9b 56 72 0b 25 89 da 3a fe 0d 8c 25 94 d6 91 ad |.Vr.%..:...%....|
peer0.org1.example.com | 00000040 a9 4f d1 7f c4 18 37 |.O....7|"
peer0.org1.example.com | "2019-05-02 09:27:53.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b6f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:53.127 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b70 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b71 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b72 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:53.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b73 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b74 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.140 UTC [gossip.discovery] sendMemResponse -> DEBU 2b75 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:53.141 UTC [msp] DeserializeIdentity -> DEBU 2b76 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.142 UTC [msp] DeserializeIdentity -> DEBU 2b77 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.143 UTC [gossip.comm] Send -> DEBU 2b78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.143 UTC [gossip.discovery] sendMemResponse -> DEBU 2b79 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101D "
peer0.org1.example.com | "2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7d Sign: digest: 3467A9C1608A1F692B5BFA73C18A48C458F06FECEAA4FE00F7B6405167B2D245 "
peer0.org1.example.com | "2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:53.150 UTC [msp] DeserializeIdentity -> DEBU 2b80 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.151 UTC [gossip.comm] Send -> DEBU 2b81 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.151 UTC [msp] DeserializeIdentity -> DEBU 2b82 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b83 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b85 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b86 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b89 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.158 UTC [gossip.gossip] handleMessage -> DEBU 2b8c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.gossip] handleMessage -> DEBU 2b8d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b8f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b90 Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.|
peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|"
peer0.org1.example.com | "2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b91 Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...|
peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......|
peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%|
peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..|
peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|"
peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b92 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b93 Verify: sig = 00000000 30 45 02 21 00 94 43 3a f2 d3 fc 95 92 6f 85 b2 |0E.!..C:.....o..|
peer0.org1.example.com | 00000010 5e 7d 68 b7 dc 0b 91 0a 0c d9 73 a2 80 92 e9 34 |^}h.......s....4|
peer0.org1.example.com | 00000020 d4 6a fc 8c f9 02 20 6b a9 94 18 6f 77 4a 59 84 |.j.... k...owJY.|
peer0.org1.example.com | 00000030 58 51 df d4 5f 6c c0 d7 24 77 42 3e ba 88 3f e5 |XQ.._l..$wB>..?.|
peer0.org1.example.com | 00000040 c6 b7 2b c8 ff b4 f8 |..+....|"
peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] isSentByMe -> DEBU 2b95 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b96 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b97 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.comm] func1 -> DEBU 2b98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b99 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b9a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b9c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.171 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba0 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [policies] Evaluate -> DEBU 2ba3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [cauthdsl] func1 -> DEBU 2ba4 0xc002c75ca0 gate 1556789273175513400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc002c75ca0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba6 0xc002c75ca0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba7 0xc002c75ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba8 0xc002c75ca0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func1 -> DEBU 2ba9 0xc002c75ca0 gate 1556789273175513400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2baa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2bab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.188 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.193 UTC [cauthdsl] func1 -> DEBU 2bad 0xc002c424e0 gate 1556789273193434500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.193 UTC [cauthdsl] func2 -> DEBU 2bae 0xc002c424e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2baf 0xc002c424e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc002c424e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [msp.identity] Verify -> DEBU 2bb1 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>|
peer0.org1.example.com | 00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|"
peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [msp.identity] Verify -> DEBU 2bb2 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~|
peer0.org1.example.com | 00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.|
peer0.org1.example.com | 00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1|
peer0.org1.example.com | 00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l|
peer0.org1.example.com | 00000040 4f 21 b8 78 20 06 |O!.x .|"
peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [cauthdsl] func2 -> DEBU 2bb3 0xc002c424e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [cauthdsl] func1 -> DEBU 2bb4 0xc002c424e0 gate 1556789273193434500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bbb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.|
peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|"
peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...|
peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......|
peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%|
peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..|
peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|"
peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bbe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] isSentByMe -> DEBU 2bbf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bc1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc2 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..|
peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|"
peer0.org1.example.com | "2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc3 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."|
peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..|
peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o|
peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o|
peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|"
peer0.org1.example.com | "2019-05-02 09:27:53.201 UTC [gossip.gossip] handleMessage -> DEBU 2bc4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.206 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.207 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bc7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:7624405555336902155 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.209 UTC [gossip.pull] HandleMessage -> DEBU 2bca GossipMessage: tag:EMPTY hello:<nonce:7624405555336902155 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.209 UTC [msp] DeserializeIdentity -> DEBU 2bcb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.210 UTC [msp] DeserializeIdentity -> DEBU 2bcc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bce Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [msp] DeserializeIdentity -> DEBU 2bd0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.pull] SendDigest -> DEBU 2bd1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.221 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bd5 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.225 UTC [msp.identity] Verify -> DEBU 2bd6 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..|
peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|"
peer0.org1.example.com | "2019-05-02 09:27:53.226 UTC [msp.identity] Verify -> DEBU 2bd8 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."|
peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..|
peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o|
peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o|
peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|"
peer0.org1.example.com | "2019-05-02 09:27:53.225 UTC [gossip.comm] func1 -> DEBU 2bd7 Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bda Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.231 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.|
peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|"
peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...|
peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......|
peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%|
peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..|
peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|"
peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bde Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.discovery] isSentByMe -> DEBU 2bdf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2be1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [msp] DeserializeIdentity -> DEBU 2be2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [policies] Evaluate -> DEBU 2be8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func1 -> DEBU 2be9 0xc002808ed0 gate 1556789273236414500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2bea 0xc002808ed0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2beb 0xc002808ed0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bec 0xc002808ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bed 0xc002808ed0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.238 UTC [cauthdsl] func1 -> DEBU 2bee 0xc002808ed0 gate 1556789273236414500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [policies] Evaluate -> DEBU 2bf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [cauthdsl] func1 -> DEBU 2bf2 0xc002809710 gate 1556789273242201000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc002809710 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc002809710 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc002809710 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [msp.identity] Verify -> DEBU 2bf6 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......|
peer0.org1.example.com | 00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|"
peer0.org1.example.com | "2019-05-02 09:27:53.244 UTC [msp.identity] Verify -> DEBU 2bf7 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....|
peer0.org1.example.com | 00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....|
peer0.org1.example.com | 00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.|
peer0.org1.example.com | 00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......|
peer0.org1.example.com | 00000040 72 8c e1 c3 66 83 |r...f.|"
peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc002809710 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [cauthdsl] func1 -> DEBU 2bf9 0xc002809710 gate 1556789273242201000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfc Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bfe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bff Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c00 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c01 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c02 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.249 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c04 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.252 UTC [msp] DeserializeIdentity -> DEBU 2c05 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c07 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c08 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func1 -> DEBU 2c0c 0xc0027c7540 gate 1556789273254075400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc0027c7540 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0e 0xc0027c7540 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0f 0xc0027c7540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [cauthdsl] func2 -> DEBU 2c10 0xc0027c7540 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [cauthdsl] func1 -> DEBU 2c11 0xc0027c7540 gate 1556789273254075400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func1 -> DEBU 2c15 0xc0027c7d80 gate 1556789273256226800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c16 0xc0027c7d80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c17 0xc0027c7d80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c18 0xc0027c7d80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [msp.identity] Verify -> DEBU 2c19 Verify: digest = 00000000 54 60 c8 b5 48 bf a9 92 d6 f5 15 1c 36 e5 1c 30 |T`..H.......6..0|
peer0.org1.example.com | 00000010 74 f9 d3 c3 8c ba b2 28 3b 5c 36 b2 4d a2 93 56 |t......(;\6.M..V|"
peer0.org1.example.com | "2019-05-02 09:27:53.257 UTC [msp.identity] Verify -> DEBU 2c1a Verify: sig = 00000000 30 44 02 20 70 3b bb 6a 4a 62 d2 53 e1 44 1a 93 |0D. p;.jJb.S.D..|
peer0.org1.example.com | 00000010 da e5 2d b3 d6 d4 3a 51 a7 2e f5 6a 76 63 a8 94 |..-...:Q...jvc..|
peer0.org1.example.com | 00000020 22 17 96 38 02 20 41 91 02 39 c3 49 b7 b6 17 7f |"..8. A..9.I....|
peer0.org1.example.com | 00000030 ee 72 5e e2 1e 60 66 3a b2 9a ee 48 ca c4 b8 19 |.r^..`f:...H....|
peer0.org1.example.com | 00000040 05 98 3a 77 9d 60 |..:w.`|"
peer0.org1.example.com | "2019-05-02 09:27:53.257 UTC [cauthdsl] func2 -> DEBU 2c1b 0xc0027c7d80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [cauthdsl] func1 -> DEBU 2c1c 0xc0027c7d80 gate 1556789273256226800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c1f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c21 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c22 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c23 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:53.261 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c24 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 "
peer0.org1.example.com | "2019-05-02 09:27:53.262 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c25 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c26 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c27 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c28 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] sendMemResponse -> DEBU 2c29 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [msp] DeserializeIdentity -> DEBU 2c2c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [gossip.comm] Send -> DEBU 2c2f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c2a Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.267 UTC [gossip.discovery] sendMemResponse -> DEBU 2c30 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:53.268 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c31 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.267 UTC [gossip.comm] sendToEndpoint -> DEBU 2c32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.270 UTC [msp] DeserializeIdentity -> DEBU 2c33 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2c34 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.272 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c36 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c37 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [policies] Evaluate -> DEBU 2c38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [cauthdsl] func1 -> DEBU 2c3b 0xc002614b10 gate 1556789273276304000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [cauthdsl] func2 -> DEBU 2c3c 0xc002614b10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3d 0xc002614b10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3e 0xc002614b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3f 0xc002614b10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c40 0xc002614b10 gate 1556789273276304000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c44 0xc002615350 gate 1556789273278938200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func2 -> DEBU 2c45 0xc002615350 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.279 UTC [cauthdsl] func2 -> DEBU 2c46 0xc002615350 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c47 0xc002615350 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c48 Verify: digest = 00000000 80 94 d8 5e f1 18 0f 6d 05 9e cc e7 c7 2d 7e a5 |...^...m.....-~.|
peer0.org1.example.com | 00000010 c1 d3 e9 bc 57 95 dd a7 b2 a5 6c 34 c4 86 c8 df |....W.....l4....|"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c49 Verify: sig = 00000000 30 45 02 21 00 b1 c9 4e 4b 22 bf 7d a5 b2 4a 33 |0E.!...NK".}..J3|
peer0.org1.example.com | 00000010 60 f0 8e ea 40 06 73 24 ee 8d a0 ff 9f 3f 28 69 |`...@.s$.....?(i|
peer0.org1.example.com | 00000020 06 0b a6 80 15 02 20 25 45 22 66 5f 08 ad 02 7f |...... %E"f_....|
peer0.org1.example.com | 00000030 d5 e2 8c 7f 52 06 3b 31 fd 48 ab 0b 8f 83 b0 cd |....R.;1.H......|
peer0.org1.example.com | 00000040 16 81 d6 f0 66 8b 5d |....f.]|"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c4a 0xc002615350 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func1 -> DEBU 2c4b 0xc002615350 gate 1556789273278938200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [policies] Evaluate -> DEBU 2c4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c50 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [gossip.discovery] sendMemResponse -> DEBU 2c51 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:53.282 UTC [msp] DeserializeIdentity -> DEBU 2c52 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c53 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [gossip.comm] Send -> DEBU 2c55 Entering, sending GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.discovery] sendMemResponse -> DEBU 2c56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c58 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.810 UTC [gossip.comm] func1 -> DEBU 2c59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.810 UTC [gossip.gossip] handleMessage -> DEBU 2c5a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.812 UTC [gossip.gossip] handleMessage -> DEBU 2c5b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.812 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.813 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c5d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:53.813 UTC [msp] DeserializeIdentity -> DEBU 2c5e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c5f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c60 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c61 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [policies] Evaluate -> DEBU 2c62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func1 -> DEBU 2c65 0xc0025d5bc0 gate 1556789273816100700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c66 0xc0025d5bc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c67 0xc0025d5bc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.817 UTC [cauthdsl] func2 -> DEBU 2c68 0xc0025d5bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [cauthdsl] func2 -> DEBU 2c69 0xc0025d5bc0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [cauthdsl] func1 -> DEBU 2c6a 0xc0025d5bc0 gate 1556789273816100700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func1 -> DEBU 2c6e 0xc002566400 gate 1556789273818896100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc002566400 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c70 0xc002566400 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c71 0xc002566400 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [msp.identity] Verify -> DEBU 2c72 Verify: digest = 00000000 c7 ea 98 ae dd 49 1d c3 5a a2 59 45 cb 57 32 20 |.....I..Z.YE.W2 |
peer0.org1.example.com | 00000010 d2 d4 25 a2 07 34 34 fe 75 77 36 54 6a 69 81 0a |..%..44.uw6Tji..|"
peer0.org1.example.com | "2019-05-02 09:27:53.820 UTC [msp.identity] Verify -> DEBU 2c73 Verify: sig = 00000000 30 45 02 21 00 93 3d ca a3 f6 16 cd b9 de 79 77 |0E.!..=.......yw|
peer0.org1.example.com | 00000010 8d b6 bb 52 f5 4d 6f 89 5c c7 51 78 96 d9 ab 83 |...R.Mo.\.Qx....|
peer0.org1.example.com | 00000020 cf 22 be 6e 7c 02 20 06 66 14 b6 b1 c4 00 f4 16 |.".n|. .f.......|
peer0.org1.example.com | 00000030 23 7e a0 ec 4e 1b 34 c1 4a 26 71 63 b6 08 6e c2 |#~..N.4.J&qc..n.|
peer0.org1.example.com | 00000040 f7 3a 98 96 7e 4c dc |.:..~L.|"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [cauthdsl] func2 -> DEBU 2c74 0xc002566400 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [cauthdsl] func1 -> DEBU 2c75 0xc002566400 gate 1556789273818896100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c76 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c78 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c7a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c80 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c81 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [msp] DeserializeIdentity -> DEBU 2c82 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c84 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c88 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c89 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [gossip.gossip] handleMessage -> DEBU 2c85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c8e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c90 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c92 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c93 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c94 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:53.829 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c96 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:53.829 UTC [gossip.gossip] handleMessage -> DEBU 2c97 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101E "
peer0.org1.example.com | "2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c99 Sign: digest: C6C4B52E1E86197CF13CA2D018E3C6F21F2242615E7EEAB488E7A883173577B1 "
peer0.org1.example.com | "2019-05-02 09:27:54.046 UTC [msp.identity] Sign -> DEBU 2c9a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:54.047 UTC [msp.identity] Sign -> DEBU 2c9b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:54.048 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2c9c Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2c9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2ca2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [msp] DeserializeIdentity -> DEBU 2ca4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [gossip.comm] Send -> DEBU 2ca5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.090 UTC [gossip.gossip] handleMessage -> DEBU 2caa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.091 UTC [gossip.gossip] handleMessage -> DEBU 2cab Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2cae Verify: digest = 00000000 f2 5d 27 ab c1 e0 9c db 76 dd 3a a5 c4 05 82 ff |.]'.....v.:.....|
peer0.org1.example.com | 00000010 3f 52 39 a5 02 ed 24 c9 46 5c 66 5e 77 04 8f 58 |?R9...$.F\f^w..X|"
peer0.org1.example.com | "2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2caf Verify: sig = 00000000 30 44 02 20 18 54 a2 d3 e8 a7 31 b7 f9 30 98 1b |0D. .T....1..0..|
peer0.org1.example.com | 00000010 f2 59 18 89 25 54 06 13 d8 90 be c1 c4 39 31 ae |.Y..%T.......91.|
peer0.org1.example.com | 00000020 29 f3 59 1d 02 20 15 4a 37 78 68 2a 09 d2 0e 7d |).Y.. .J7xh*...}|
peer0.org1.example.com | 00000030 4e 7c f1 5d df 3b 96 dd fb b9 2f 86 9b 3a 9c 90 |N|.].;..../..:..|
peer0.org1.example.com | 00000040 5e ed a8 23 31 e0 |^..#1.|"
peer0.org1.example.com | "2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb1 Verify: sig = 00000000 30 45 02 21 00 9f be 4d b8 64 d0 91 c8 ac a4 46 |0E.!...M.d.....F|
peer0.org1.example.com | 00000010 bb cc c8 65 67 16 c4 02 6e f7 eb 94 ee 91 83 d8 |...eg...n.......|
peer0.org1.example.com | 00000020 d1 d5 04 09 ec 02 20 5e ab d7 67 1f 7d 80 07 c0 |...... ^..g.}...|
peer0.org1.example.com | 00000030 f6 6c 50 74 bf f0 24 c8 fc e4 b7 4f c3 5c b3 95 |.lPt..$....O.\..|
peer0.org1.example.com | 00000040 5f f4 10 29 bc f5 9f |_..)...|"
peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb8 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb9 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cba Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cbb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.comm] func1 -> DEBU 2cbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cc0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.104 UTC [msp] DeserializeIdentity -> DEBU 2cc3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.106 UTC [gossip.comm] Send -> DEBU 2cc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.106 UTC [msp] DeserializeIdentity -> DEBU 2cc7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] Send -> DEBU 2cc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cc9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccc Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2ccd Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2cce Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ccf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cd0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [msp] DeserializeIdentity -> DEBU 2cd1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:54.172 UTC [policies] Evaluate -> DEBU 2cd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:54.174 UTC [cauthdsl] func1 -> DEBU 2cd8 0xc0024489f0 gate 1556789274174389000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:54.175 UTC [cauthdsl] func2 -> DEBU 2cd9 0xc0024489f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cda 0xc0024489f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cdb 0xc0024489f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:54.177 UTC [cauthdsl] func2 -> DEBU 2cdc 0xc0024489f0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:54.179 UTC [gossip.gossip] handleMessage -> DEBU 2cdd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.179 UTC [gossip.comm] func1 -> DEBU 2cde Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.180 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc0024489f0 gate 1556789274174389000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 2ce2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:54.184 UTC [cauthdsl] func1 -> DEBU 2ce3 0xc002449630 gate 1556789274184562900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce4 0xc002449630 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc002449630 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:54.186 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc002449630 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce7 Verify: digest = 00000000 cf 51 72 cc 05 64 23 d4 f6 e4 07 62 c5 6b fb 4f |.Qr..d#....b.k.O|
peer0.org1.example.com | 00000010 81 96 68 ce bf db 48 61 f6 2c 61 97 0b ad 2d b2 |..h...Ha.,a...-.|"
peer0.org1.example.com | "2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce8 Verify: sig = 00000000 30 44 02 20 7b e9 0e fa 5e ce 6a d1 a3 0a 06 40 |0D. {...^.j....@|
peer0.org1.example.com | 00000010 de a2 77 4b 1a b9 bb df fb ba c2 f4 5c 93 73 09 |..wK........\.s.|
peer0.org1.example.com | 00000020 fa 23 9d 9f 02 20 77 7f 15 0e eb dc 36 c8 9b f8 |.#... w.....6...|
peer0.org1.example.com | 00000030 dc c0 6f f1 a2 79 86 4f c1 63 f1 64 e5 46 85 d9 |..o..y.O.c.d.F..|
peer0.org1.example.com | 00000040 d7 ed 9b 70 0c a6 |...p..|"
peer0.org1.example.com | "2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 2ce9 0xc002449630 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [cauthdsl] func1 -> DEBU 2cea 0xc002449630 gate 1556789274184562900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2ceb Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2cec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.192 UTC [policies] Evaluate -> DEBU 2ced Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.193 UTC [policies] Evaluate -> DEBU 2cee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:54.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 "
peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cf5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cf6 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.199 UTC [gossip.gossip] handleMessage -> DEBU 2cf7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.200 UTC [gossip.gossip] handleMessage -> DEBU 2cf8 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cf9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cfa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.202 UTC [msp] DeserializeIdentity -> DEBU 2cfb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.203 UTC [msp] DeserializeIdentity -> DEBU 2cfc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.204 UTC [msp] DeserializeIdentity -> DEBU 2cfd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.205 UTC [msp] DeserializeIdentity -> DEBU 2cfe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.207 UTC [gossip.comm] Send -> DEBU 2cff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.208 UTC [msp] DeserializeIdentity -> DEBU 2d00 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [msp] DeserializeIdentity -> DEBU 2d01 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] Send -> DEBU 2d02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d04 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d05 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d06 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.219 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d08 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.221 UTC [gossip.gossip] handleMessage -> DEBU 2d09 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [gossip.comm] Send -> DEBU 2d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d13 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d14 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.249 UTC [gossip.comm] func1 -> DEBU 2d15 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.249 UTC [gossip.gossip] handleMessage -> DEBU 2d16 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d17 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d18 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d19 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d1a Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [cauthdsl] func1 -> DEBU 2d23 0xc002353440 gate 1556789276251913000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d24 0xc002353440 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d25 0xc002353440 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d26 0xc002353440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d27 0xc002353440 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d28 0xc002353440 gate 1556789276251913000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d2c 0xc002353cd0 gate 1556789276252565300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2d 0xc002353cd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2e 0xc002353cd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2f 0xc002353cd0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d30 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d31 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:56.257 UTC [cauthdsl] func2 -> DEBU 2d32 0xc002353cd0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.257 UTC [cauthdsl] func1 -> DEBU 2d33 0xc002353cd0 gate 1556789276252565300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d36 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.259 UTC [policies] Evaluate -> DEBU 2d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d38 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [msp] DeserializeIdentity -> DEBU 2d39 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func1 -> DEBU 2d40 0xc0022546b0 gate 1556789276261784300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d41 0xc0022546b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d42 0xc0022546b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d43 0xc0022546b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d44 0xc0022546b0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.264 UTC [cauthdsl] func1 -> DEBU 2d45 0xc0022546b0 gate 1556789276261784300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func1 -> DEBU 2d49 0xc002254f20 gate 1556789276265797700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4a 0xc002254f20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4b 0xc002254f20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4c 0xc002254f20 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:56.268 UTC [cauthdsl] func2 -> DEBU 2d4f 0xc002254f20 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [cauthdsl] func1 -> DEBU 2d50 0xc002254f20 gate 1556789276265797700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.270 UTC [policies] Evaluate -> DEBU 2d53 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [policies] Evaluate -> DEBU 2d54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d55 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d56 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d57 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.272 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.273 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [policies] Evaluate -> DEBU 2d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.277 UTC [cauthdsl] func1 -> DEBU 2d60 0xc002238bd0 gate 1556789276277150800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.277 UTC [cauthdsl] func2 -> DEBU 2d61 0xc002238bd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d62 0xc002238bd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d63 0xc002238bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d64 0xc002238bd0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func1 -> DEBU 2d65 0xc002238bd0 gate 1556789276277150800 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.280 UTC [policies] Evaluate -> DEBU 2d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func1 -> DEBU 2d69 0xc002239420 gate 1556789276280966900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6a 0xc002239420 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6b 0xc002239420 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6c 0xc002239420 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [msp.identity] Verify -> DEBU 2d6d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:56.282 UTC [msp.identity] Verify -> DEBU 2d6e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [cauthdsl] func2 -> DEBU 2d6f 0xc002239420 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [cauthdsl] func1 -> DEBU 2d70 0xc002239420 gate 1556789276280966900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d73 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [msp.identity] Verify -> DEBU 2d75 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d76 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d77 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d78 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:56.285 UTC [msp] DeserializeIdentity -> DEBU 2d79 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [msp] DeserializeIdentity -> DEBU 2d7a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [cauthdsl] func1 -> DEBU 2d81 0xc002217a80 gate 1556789276287691700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d82 0xc002217a80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d83 0xc002217a80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d84 0xc002217a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d85 0xc002217a80 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d86 0xc002217a80 gate 1556789276287691700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc002204480 gate 1556789276289635800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8b 0xc002204480 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8c 0xc002204480 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8d 0xc002204480 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8e Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8f Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [cauthdsl] func2 -> DEBU 2d90 0xc002204480 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [cauthdsl] func1 -> DEBU 2d91 0xc002204480 gate 1556789276289635800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d94 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [gossip.gossip] handleMessage -> DEBU 2d96 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.292 UTC [gossip.gossip] handleMessage -> DEBU 2d97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.292 UTC [msp] DeserializeIdentity -> DEBU 2d98 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d99 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d9a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [policies] Evaluate -> DEBU 2da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func1 -> DEBU 2da1 0xc002205fb0 gate 1556789276296453500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da2 0xc002205fb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da3 0xc002205fb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da4 0xc002205fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [cauthdsl] func2 -> DEBU 2da5 0xc002205fb0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [cauthdsl] func1 -> DEBU 2da6 0xc002205fb0 gate 1556789276296453500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func1 -> DEBU 2daa 0xc0021c27f0 gate 1556789276298112300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dab 0xc0021c27f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dac 0xc0021c27f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dad 0xc0021c27f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [msp.identity] Verify -> DEBU 2dae Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [msp.identity] Verify -> DEBU 2daf Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [cauthdsl] func2 -> DEBU 2db0 0xc0021c27f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [cauthdsl] func1 -> DEBU 2db1 0xc0021c27f0 gate 1556789276298112300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [policies] Evaluate -> DEBU 2db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db4 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db6 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db7 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db8 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db9 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbd Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbe Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func1 -> DEBU 2dc2 0xc00218af00 gate 1556789276305004400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc00218af00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc00218af00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc00218af00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc00218af00 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc00218af00 gate 1556789276305004400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [policies] Evaluate -> DEBU 2dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func1 -> DEBU 2dcb 0xc00218b740 gate 1556789276307255500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcc 0xc00218b740 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcd 0xc00218b740 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dce 0xc00218b740 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [msp.identity] Verify -> DEBU 2dcf Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:27:56.308 UTC [msp.identity] Verify -> DEBU 2dd0 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:27:56.308 UTC [cauthdsl] func2 -> DEBU 2dd1 0xc00218b740 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [cauthdsl] func1 -> DEBU 2dd2 0xc00218b740 gate 1556789276307255500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [gossip.gossip] handleMessage -> DEBU 2dd7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.504 UTC [gossip.gossip] handleMessage -> DEBU 2dd8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.504 UTC [msp] DeserializeIdentity -> DEBU 2dd9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.505 UTC [msp] DeserializeIdentity -> DEBU 2dda Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.505 UTC [gossip.gossip] handleMessage -> DEBU 2ddb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12603717074931619385 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.pull] HandleMessage -> DEBU 2ddd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12603717074931619385 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.pull] SendDigest -> DEBU 2dde Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.comm] func1 -> DEBU 2de5 Got message: GossipMessage: tag:EMPTY hello:<nonce:17356832678716504794 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.gossip] handleMessage -> DEBU 2de6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:17356832678716504794 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.pull] HandleMessage -> DEBU 2de7 GossipMessage: tag:EMPTY hello:<nonce:17356832678716504794 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2deb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2ded Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [gossip.pull] SendDigest -> DEBU 2dee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [gossip.gossip] handleMessage -> DEBU 2def Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.comm] func1 -> DEBU 2df0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2df4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [msp] DeserializeIdentity -> DEBU 2df5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2df6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002177c10 gate 1556789276837575500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002177c10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002177c10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002177c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2e00 0xc002177c10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.840 UTC [cauthdsl] func1 -> DEBU 2e01 0xc002177c10 gate 1556789276837575500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:56.840 UTC [policies] Evaluate -> DEBU 2e02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [cauthdsl] func1 -> DEBU 2e05 0xc002152450 gate 1556789276841318900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [cauthdsl] func2 -> DEBU 2e06 0xc002152450 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e07 0xc002152450 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e08 0xc002152450 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e09 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..|
peer0.org1.example.com | 00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|"
peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e0a Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP|
peer0.org1.example.com | 00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<|
peer0.org1.example.com | 00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...|
peer0.org1.example.com | 00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W|
peer0.org1.example.com | 00000040 cd 97 3a f0 2b 03 e9 |..:.+..|"
peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [cauthdsl] func2 -> DEBU 2e0b 0xc002152450 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [cauthdsl] func1 -> DEBU 2e0c 0xc002152450 gate 1556789276841318900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e0f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e13 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e16 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e17 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e18 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.848 UTC [gossip.discovery] sendMemResponse -> DEBU 2e19 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:27:56.848 UTC [msp] DeserializeIdentity -> DEBU 2e1a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.850 UTC [gossip.comm] Send -> DEBU 2e1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:56.850 UTC [gossip.discovery] sendMemResponse -> DEBU 2e1e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:56.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2e1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.853 UTC [gossip.comm] sendToEndpoint -> DEBU 2e20 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:56.980 UTC [gossip.comm] func1 -> DEBU 2e21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.980 UTC [gossip.gossip] handleMessage -> DEBU 2e22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e23 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e24 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.982 UTC [msp] DeserializeIdentity -> DEBU 2e25 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:56.983 UTC [gossip.gossip] handleMessage -> DEBU 2e26 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e27 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e28 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [gossip.pull] Hello -> DEBU 2e29 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e2a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.009 UTC [msp] DeserializeIdentity -> DEBU 2e2b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] Send -> DEBU 2e2c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18423874894943821565 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18423874894943821565 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e2f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.pull] HandleMessage -> DEBU 2e30 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e31 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e32 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10010669141402163957 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.pull] HandleMessage -> DEBU 2e33 GossipMessage: tag:EMPTY hello:<nonce:10010669141402163957 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.pull] SendDigest -> DEBU 2e34 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e35 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e36 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e37 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7030554139193622813 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e38 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e39 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15705107216210067546 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e3a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e3b Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16480138393559414308 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16480138393559414308 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7030554139193622813 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15705107216210067546 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e41 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e42 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.pull] HandleMessage -> DEBU 2e43 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e44 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.pull] HandleMessage -> DEBU 2e46 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e47 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.111 UTC [gossip.comm] func1 -> DEBU 2e48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.111 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.112 UTC [gossip.pull] HandleMessage -> DEBU 2e4a GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.112 UTC [gossip.gossip] handleMessage -> DEBU 2e4b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e4e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [msp.identity] Verify -> DEBU 2e50 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m|
peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K.<t|"
peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [msp.identity] Verify -> DEBU 2e51 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...|
peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6|
peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..|
peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........|
peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e52 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e53 Verify: sig = 00000000 30 45 02 21 00 91 6d 90 e3 8f d0 7a 64 a1 c4 b1 |0E.!..m....zd...|
peer0.org1.example.com | 00000010 ef 90 ca 71 06 63 7c cb 00 72 07 dc e5 f5 41 74 |...q.c|..r....At|
peer0.org1.example.com | 00000020 11 93 da 55 9d 02 20 0e 57 85 06 f5 6b f4 75 47 |...U.. .W...k.uG|
peer0.org1.example.com | 00000030 6f 73 86 27 d4 ab d6 b5 da 9c 9f d7 a2 97 1e 47 |os.'...........G|
peer0.org1.example.com | 00000040 16 cf 10 f2 3b ab b7 |....;..|"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e54 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e55 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e56 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e57 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e58 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e59 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e5a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e5c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.comm] Send -> DEBU 2e5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e60 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e62 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e63 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101F "
peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e64 Sign: digest: 6B0A58B13013B23FF775E1CEC33391F5B408A02DEB67E06DA5A846E2FAE1E90C "
peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e65 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e66 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp] DeserializeIdentity -> DEBU 2e67 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [msp] DeserializeIdentity -> DEBU 2e69 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e71 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.comm] func1 -> DEBU 2e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e73 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e74 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [msp.identity] Verify -> DEBU 2e77 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m|
peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K.<t|"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [msp.identity] Verify -> DEBU 2e78 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...|
peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6|
peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..|
peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........|
peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e7b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7c Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..|
peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7d Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...|
peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.|
peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.|
peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{|
peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] isSentByMe -> DEBU 2e7f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e80 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e81 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e82 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e83 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e85 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e86 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..|
peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|"
peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e87 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...|
peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.|
peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.|
peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{|
peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e88 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e89 Verify: sig = 00000000 30 44 02 20 32 a2 79 ad c6 1f 0f 61 cb c2 bf b5 |0D. 2.y....a....|
peer0.org1.example.com | 00000010 d7 fe 41 47 77 a9 95 ce eb 6f e1 a9 83 18 fd 33 |..AGw....o.....3|
peer0.org1.example.com | 00000020 d4 bd d6 9c 02 20 52 02 53 e0 e7 60 b8 1d 2c df |..... R.S..`..,.|
peer0.org1.example.com | 00000030 99 33 73 b6 51 91 41 33 d6 2e d2 0e 92 10 da 39 |.3s.Q.A3.......9|
peer0.org1.example.com | 00000040 89 1a 5d 8e ce 76 |..]..v|"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] isSentByMe -> DEBU 2e8b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e8d Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e91 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp] DeserializeIdentity -> DEBU 2e92 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e94 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e95 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e99 0xc0003a4be0 gate 1556789277168239700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9a 0xc0003a4be0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9b 0xc0003a4be0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9c 0xc0003a4be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9d 0xc0003a4be0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e9e 0xc0003a4be0 gate 1556789277168239700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea2 0xc0003a5430 gate 1556789277168593100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea3 0xc0003a5430 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea4 0xc0003a5430 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc0003a5430 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea6 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..|
peer0.org1.example.com | 00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea7 Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP|
peer0.org1.example.com | 00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<|
peer0.org1.example.com | 00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...|
peer0.org1.example.com | 00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W|
peer0.org1.example.com | 00000040 cd 97 3a f0 2b 03 e9 |..:.+..|"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea8 0xc0003a5430 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea9 0xc0003a5430 gate 1556789277168593100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eac Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eaf Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb1 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m|
peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K.<t|"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb2 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...|
peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6|
peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..|
peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........|
peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb6 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..|
peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|"
peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb7 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...|
peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.|
peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.|
peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{|
peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|"
peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] isSentByMe -> DEBU 2eb9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eba Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.194 UTC [gossip.gossip] handleMessage -> DEBU 2ebc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebd Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebe Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6458123056124305210 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.pull] HandleMessage -> DEBU 2ebf GossipMessage: tag:EMPTY hello:<nonce:6458123056124305210 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.pull] SendDigest -> DEBU 2ec6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ec7 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ec9 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [msp] DeserializeIdentity -> DEBU 2eca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ecb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecc Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecd Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [policies] Evaluate -> DEBU 2ece == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ecf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed1 0xc00030a230 gate 1556789277199077300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed2 0xc00030a230 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc00030a230 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc00030a230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc00030a230 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed6 0xc00030a230 gate 1556789277199077300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2eda 0xc00030af70 gate 1556789277199421000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edb 0xc00030af70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edc 0xc00030af70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edd 0xc00030af70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2ede Verify: digest = 00000000 9d 84 f9 c6 2f 0e e1 a8 68 f4 96 d0 f2 60 0d 87 |..../...h....`..|
peer0.org1.example.com | 00000010 93 5c 81 bb cb 10 dc 2e 72 96 7a 59 5b bb 78 18 |.\......r.zY[.x.|"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2edf Verify: sig = 00000000 30 44 02 20 3c 5e ad dc 85 4b 7c 5d e8 36 7a d3 |0D. <^...K|].6z.|
peer0.org1.example.com | 00000010 30 3b ac 40 88 88 bf b0 17 6b b6 de d0 2d b1 a0 |0;.@.....k...-..|
peer0.org1.example.com | 00000020 af a9 21 e6 02 20 64 e3 0c 2b 28 f2 71 5f 0d 6a |..!.. d..+(.q_.j|
peer0.org1.example.com | 00000030 cb d6 3d e9 a0 7c b2 a7 ad f3 a7 06 c5 cd 82 55 |..=..|.........U|
peer0.org1.example.com | 00000040 ce d6 f6 6e 89 b2 |...n..|"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ee0 0xc00030af70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ee1 0xc00030af70 gate 1556789277199421000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee4 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ee6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 "
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eea Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eeb Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eec Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eed Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2eee Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2eef Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] Send -> DEBU 2ef2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2ef3 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [gossip.election] waitForInterrupt -> DEBU 2ef6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [gossip.election] IsLeader -> DEBU 2ef7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510091801 "
peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef9 Sign: digest: 462B319F16B820A244F548AB2D0FE497F7815E8C73F97D1EC0E3C8EA6A1E9F47 "
peer0.org1.example.com | "2019-05-02 09:27:57.321 UTC [gossip.election] waitForInterrupt -> DEBU 2efa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] Send -> DEBU 2eff Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f00 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f01 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f03 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.comm] func1 -> DEBU 2f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f05 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f06 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [msp] DeserializeIdentity -> DEBU 2f09 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f10 0xc000394bd0 gate 1556789278805217700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f11 0xc000394bd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f12 0xc000394bd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f13 0xc000394bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f14 0xc000394bd0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f15 0xc000394bd0 gate 1556789278805217700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f16 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f19 0xc000395410 gate 1556789278805645500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1a 0xc000395410 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1b 0xc000395410 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1c 0xc000395410 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1d Verify: digest = 00000000 3f 3d a0 cd ab c9 e0 2f 55 b1 2c 4d 34 fa 18 04 |?=...../U.,M4...|
peer0.org1.example.com | 00000010 0a bf 9d 8a b1 79 63 21 85 8e 2e 09 3f 72 23 df |.....yc!....?r#.|"
peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1e Verify: sig = 00000000 30 45 02 21 00 af 91 78 d9 62 a8 61 d8 ab 11 f7 |0E.!...x.b.a....|
peer0.org1.example.com | 00000010 cf 50 d6 b1 a5 dc ed a4 58 0a aa 1a 4e b7 68 bf |.P......X...N.h.|
peer0.org1.example.com | 00000020 88 b4 73 f9 66 02 20 5a a1 1e 0c c1 59 a6 7d ad |..s.f. Z....Y.}.|
peer0.org1.example.com | 00000030 92 b5 1e 33 73 8d c2 d8 af 65 38 47 39 ac 6a e2 |...3s....e8G9.j.|
peer0.org1.example.com | 00000040 b6 b0 48 b4 0e bd ce |..H....|"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [cauthdsl] func2 -> DEBU 2f1f 0xc000395410 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [cauthdsl] func1 -> DEBU 2f20 0xc000395410 gate 1556789278805645500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f21 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f23 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f25 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f26 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f27 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f28 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f29 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f2a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f2b Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f30 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f31 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f32 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f33 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f34 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f35 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f36 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f37 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f38 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f39 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f3a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3c Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f3f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f40 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f41 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f42 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.026 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2f43 Sleeping 25s"
peer0.org1.example.com | "2019-05-02 09:27:59.050 UTC [msp.identity] Sign -> DEBU 2f44 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151020 "
peer0.org1.example.com | "2019-05-02 09:27:59.051 UTC [msp.identity] Sign -> DEBU 2f45 Sign: digest: 8B0F1721906A1A7B8E6E66FD82887B64909157F0976BA494FC42849BF2C88A79 "
peer0.org1.example.com | "2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f46 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f47 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:27:59.053 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f48 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f49 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [gossip.comm] Send -> DEBU 2f4c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f50 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f51 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f52 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f53 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f55 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f54 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f56 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f57 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5a Verify: digest = 00000000 ea 8e ed bf 77 a0 19 87 89 80 3b 3d 86 c9 81 d4 |....w.....;=....|
peer0.org1.example.com | 00000010 e4 ff 64 bf ae 1e 34 8c a7 b6 3f 8f 55 03 4c 83 |..d...4...?.U.L.|"
peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5b Verify: sig = 00000000 30 45 02 21 00 b7 ff 09 99 cd 32 b8 fd 9f c6 b8 |0E.!......2.....|
peer0.org1.example.com | 00000010 96 37 00 e8 6f 79 c6 dc 46 21 e4 fa 4d 7d 91 15 |.7..oy..F!..M}..|
peer0.org1.example.com | 00000020 47 aa 86 04 b0 02 20 6f a1 e9 44 a0 4f 5e 25 6c |G..... o..D.O^%l|
peer0.org1.example.com | 00000030 c6 be f7 87 b9 99 91 25 93 d5 99 1f a9 88 b7 fa |.......%........|
peer0.org1.example.com | 00000040 67 d3 af 10 17 8b 62 |g.....b|"
peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5d Verify: sig = 00000000 30 44 02 20 1d c0 36 96 a4 a3 ce 74 17 fa eb 16 |0D. ..6....t....|
peer0.org1.example.com | 00000010 b1 03 16 20 58 69 f1 2a a5 1b 3f 19 41 f2 56 17 |... Xi.*..?.A.V.|
peer0.org1.example.com | 00000020 72 c6 c2 1c 02 20 42 19 6f 02 2c 47 fe 39 ae 7b |r.... B.o.,G.9.{|
peer0.org1.example.com | 00000030 fe 7f b3 f5 03 01 16 cc 3f ec 36 7b e5 70 a9 b9 |........?.6{.p..|
peer0.org1.example.com | 00000040 43 38 88 fb f4 1f |C8....|"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 "
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 "
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f63 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f64 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.103 UTC [gossip.comm] func1 -> DEBU 2f66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f67 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f68 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.106 UTC [msp] DeserializeIdentity -> DEBU 2f6b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [msp] DeserializeIdentity -> DEBU 2f6c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6e Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f70 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [gossip.comm] Send -> DEBU 2f72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f73 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f74 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f75 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f79 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f7a Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [msp] DeserializeIdentity -> DEBU 2f7d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f7f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f80 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f84 0xc0003cfff0 gate 1556789279167003300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f85 0xc0003cfff0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f86 0xc0003cfff0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f87 0xc0003cfff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f88 0xc0003cfff0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f89 0xc0003cfff0 gate 1556789279167003300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:27:59.168 UTC [cauthdsl] func1 -> DEBU 2f8d 0xc000259f00 gate 1556789279167854300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f8f 0xc000259f00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f90 0xc000259f00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f91 0xc000259f00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f92 Verify: digest = 00000000 5b 6d 36 c7 b1 e1 9b 57 5e 59 2d 60 43 d2 38 d5 |[m6....W^Y-`C.8.|
peer0.org1.example.com | 00000010 26 40 f4 06 37 57 00 91 0f 3a 6a 5b 4f 9e 32 ed |&@..7W...:j[O.2.|"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f93 Verify: sig = 00000000 30 44 02 20 00 b3 a1 9b c5 32 0f ce b8 61 e6 6a |0D. .....2...a.j|
peer0.org1.example.com | 00000010 6e cd 9f 39 79 bb ab 5b ad a2 ad 3f f3 8a 47 f1 |n..9y..[...?..G.|
peer0.org1.example.com | 00000020 d5 46 2b cf 02 20 37 e3 65 ad 8f b4 f7 ce b5 d1 |.F+.. 7.e.......|
peer0.org1.example.com | 00000030 a2 e1 44 61 5d 75 5c 5c a7 f9 3a b5 5a 3f da fb |..Da]u\\..:.Z?..|
peer0.org1.example.com | 00000040 fd b3 b5 d9 39 94 |....9.|"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f94 0xc000259f00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func1 -> DEBU 2f95 0xc000259f00 gate 1556789279167854300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f98 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [policies] Evaluate -> DEBU 2f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f9a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 "
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9f Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fa0 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa1 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.168 UTC [gossip.comm] func1 -> DEBU 2f8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa3 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.182 UTC [msp] DeserializeIdentity -> DEBU 2fa6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.184 UTC [msp] DeserializeIdentity -> DEBU 2fa9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2faa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2fab Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.186 UTC [gossip.comm] Send -> DEBU 2fac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.186 UTC [msp] DeserializeIdentity -> DEBU 2fad Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.187 UTC [msp] DeserializeIdentity -> DEBU 2fae Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.comm] Send -> DEBU 2faf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.gossip] handleMessage -> DEBU 2fb0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.gossip] handleMessage -> DEBU 2fb2 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb4 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb5 Exiting"
peer0.org1.example.com | "2019-05-02 09:27:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:27:59.191 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [gossip.comm] Send -> DEBU 2fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbe Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [gossip.comm] func1 -> DEBU 2fc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [gossip.gossip] handleMessage -> DEBU 2fc2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fcc 0xc002d965a0 gate 1556789280252279900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcd 0xc002d965a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fce 0xc002d965a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcf 0xc002d965a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd0 0xc002d965a0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd1 0xc002d965a0 gate 1556789280252279900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd5 0xc002d96e10 gate 1556789280252630800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd6 0xc002d96e10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd7 0xc002d96e10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd8 0xc002d96e10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fd9 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fda Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fdb 0xc002d96e10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [cauthdsl] func1 -> DEBU 2fdc 0xc002d96e10 gate 1556789280252630800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe1 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe2 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe3 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe4 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe8 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe9 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [policies] Evaluate -> DEBU 2fea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2feb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2fec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2fed 0xc0025d7590 gate 1556789280265584100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fee 0xc0025d7590 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fef 0xc0025d7590 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff0 0xc0025d7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff1 0xc0025d7590 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc0025d7590 gate 1556789280265584100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func1 -> DEBU 2ff6 0xc0025d7dd0 gate 1556789280266231600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff7 0xc0025d7dd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc0025d7dd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff9 0xc0025d7dd0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffa Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffb Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc0025d7dd0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [cauthdsl] func1 -> DEBU 2ffd 0xc0025d7dd0 gate 1556789280266231600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2ffe Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2fff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3000 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3001 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3002 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3003 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3004 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3005 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3006 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3007 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3008 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3009 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 300a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3010 0xc00248a640 gate 1556789280268613600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3011 0xc00248a640 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3012 0xc00248a640 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3013 0xc00248a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3014 0xc00248a640 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3015 0xc00248a640 gate 1556789280268613600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3016 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3018 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3019 0xc00248ae90 gate 1556789280268968200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301a 0xc00248ae90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301b 0xc00248ae90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301c 0xc00248ae90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301d Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301e Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301f 0xc00248ae90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func1 -> DEBU 3020 0xc00248ae90 gate 1556789280268968200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3021 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3022 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3023 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3024 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3025 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3026 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3027 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3028 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3029 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [policies] Evaluate -> DEBU 302c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [cauthdsl] func1 -> DEBU 302d 0xc00252a660 gate 1556789280274445000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [cauthdsl] func2 -> DEBU 302e 0xc00252a660 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 302f 0xc00252a660 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3030 0xc00252a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3031 0xc00252a660 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func1 -> DEBU 3032 0xc00252a660 gate 1556789280274445000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3033 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [policies] Evaluate -> DEBU 3035 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func1 -> DEBU 3036 0xc00252aea0 gate 1556789280276085900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3037 0xc00252aea0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3038 0xc00252aea0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [cauthdsl] func2 -> DEBU 3039 0xc00252aea0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303a Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303b Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [cauthdsl] func2 -> DEBU 303c 0xc00252aea0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [cauthdsl] func1 -> DEBU 303d 0xc00252aea0 gate 1556789280276085900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3040 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3041 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [gossip.gossip] handleMessage -> DEBU 3042 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [gossip.gossip] handleMessage -> DEBU 3043 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3044 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3045 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3047 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3048 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3049 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func1 -> DEBU 304d 0xc00370aa20 gate 1556789280281536300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304e 0xc00370aa20 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304f 0xc00370aa20 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3050 0xc00370aa20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3051 0xc00370aa20 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.292 UTC [cauthdsl] func1 -> DEBU 3052 0xc00370aa20 gate 1556789280281536300 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.292 UTC [policies] Evaluate -> DEBU 3053 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3054 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 3056 0xc00370b260 gate 1556789280296953500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3057 0xc00370b260 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3058 0xc00370b260 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3059 0xc00370b260 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305a Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305b Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 305c 0xc00370b260 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 305d 0xc00370b260 gate 1556789280296953500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 3060 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.300 UTC [policies] Evaluate -> DEBU 3061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.301 UTC [msp.identity] Verify -> DEBU 3062 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3063 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3064 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:00.303 UTC [msp.identity] Verify -> DEBU 3065 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:00.303 UTC [msp] DeserializeIdentity -> DEBU 3066 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [msp] DeserializeIdentity -> DEBU 3067 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3068 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3069 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 306a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func1 -> DEBU 306e 0xc0031d3890 gate 1556789280304762700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 306f 0xc0031d3890 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3070 0xc0031d3890 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3071 0xc0031d3890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3072 0xc0031d3890 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3073 0xc0031d3890 gate 1556789280304762700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3074 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3075 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3076 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3077 0xc0032220d0 gate 1556789280305516800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3078 0xc0032220d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3079 0xc0032220d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 307a 0xc0032220d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307b Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307c Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:00.306 UTC [cauthdsl] func2 -> DEBU 307d 0xc0032220d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [cauthdsl] func1 -> DEBU 307e 0xc0032220d0 gate 1556789280305516800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 307f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3081 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [gossip.gossip] handleMessage -> DEBU 3083 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3085 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3086 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3087 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:00.570 UTC [gossip.gossip] handleMessage -> DEBU 3088 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7413489307551662264 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.pull] HandleMessage -> DEBU 3089 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7413489307551662264 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.pull] SendDigest -> DEBU 308a Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.gossip] handleMessage -> DEBU 308b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151021 "
peer0.org1.example.com | "2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308d Sign: digest: 6CEFE7D0473B4E118851FB15DB8292827AA4E55AA097DF10B2FA116BB361EB8E "
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3090 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3091 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3092 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3093 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3094 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3095 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3096 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3097 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3098 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 309a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.comm] func1 -> DEBU 309b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 309e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 309f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a0 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......|
peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|"
peer0.org1.example.com | "2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a1 Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...|
peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......|
peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......|
peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..|
peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30a2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:12953625874132786161 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.pull] HandleMessage -> DEBU 30a3 GossipMessage: tag:EMPTY hello:<nonce:12953625874132786161 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.pull] SendDigest -> DEBU 30aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ab Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] isSentByMe -> DEBU 30ae Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30af Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [msp] DeserializeIdentity -> DEBU 30b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [cauthdsl] func1 -> DEBU 30ba 0xc00268cc40 gate 1556789281648918000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bb 0xc00268cc40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bc 0xc00268cc40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bd 0xc00268cc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30be 0xc00268cc40 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30bf 0xc00268cc40 gate 1556789281648918000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30c3 0xc00268d480 gate 1556789281649313100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c4 0xc00268d480 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c5 0xc00268d480 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c6 0xc00268d480 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [msp.identity] Verify -> DEBU 30c7 Verify: digest = 00000000 d0 ef 71 3c 59 d2 9a e9 ce 07 8f 2d ef 23 1e 4f |..q<Y......-.#.O|
peer0.org1.example.com | 00000010 9d 20 e2 7d b8 ed 63 cf a9 42 ee bb bc 09 75 73 |. .}..c..B....us|"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [msp.identity] Verify -> DEBU 30c8 Verify: sig = 00000000 30 45 02 21 00 b6 df 1c c9 fa 2f 0c e5 da 0d 89 |0E.!....../.....|
peer0.org1.example.com | 00000010 89 79 4e 26 51 9b af 8f 22 ea 3a 6a 6c aa a2 b0 |.yN&Q...".:jl...|
peer0.org1.example.com | 00000020 4d f8 b5 dd 06 02 20 73 77 da d5 7e 80 1f fb f5 |M..... sw..~....|
peer0.org1.example.com | 00000030 ec ef b8 ea 2e 84 01 cf 2e 4f b9 fd bb 8d 1d be |.........O......|
peer0.org1.example.com | 00000040 61 9d e1 82 21 48 7d |a...!H}|"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c9 0xc00268d480 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30ca 0xc00268d480 gate 1556789281649313100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cd Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 30cf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 "
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 30d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30d7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] Send -> DEBU 30db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30dc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30dd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30de Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30df Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30e0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30e8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30e9 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......|
peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30ea Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...|
peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......|
peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......|
peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..|
peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] isSentByMe -> DEBU 30ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ed Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ee Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.comm] func1 -> DEBU 30ef Got message: GossipMessage: tag:EMPTY hello:<nonce:749391369752996846 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.gossip] handleMessage -> DEBU 30f0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:749391369752996846 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.pull] HandleMessage -> DEBU 30f1 GossipMessage: tag:EMPTY hello:<nonce:749391369752996846 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.pull] SendDigest -> DEBU 30f8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30f9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30fc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30fd Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30fe Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......|
peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30ff Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...|
peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......|
peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......|
peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..|
peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3100 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3101 Verify: sig = 00000000 30 44 02 21 00 e2 28 8d 93 0e 5f e2 37 61 8b 26 |0D.!..(..._.7a.&|
peer0.org1.example.com | 00000010 c6 79 d6 da 50 72 8b 9f 4b 65 41 2e cb 16 d7 95 |.y..Pr..KeA.....|
peer0.org1.example.com | 00000020 fa af 3a 35 f8 02 1f 55 77 32 2c 63 1c c5 f3 49 |..:5...Uw2,c...I|
peer0.org1.example.com | 00000030 b4 7c df 00 c5 46 1f d8 fc 1e c7 46 ac e1 d8 27 |.|...F.....F...'|
peer0.org1.example.com | 00000040 81 b8 fc b5 d7 b9 |......|"
peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 3102 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.654 UTC [gossip.discovery] isSentByMe -> DEBU 3103 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3104 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:17928920518119595175 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.pull] HandleMessage -> DEBU 3105 GossipMessage: tag:EMPTY hello:<nonce:17928920518119595175 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.pull] SendDigest -> DEBU 3106 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3107 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.686 UTC [gossip.gossip] handleMessage -> DEBU 3108 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.687 UTC [gossip.comm] func1 -> DEBU 3109 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [gossip.pull] Hello -> DEBU 310c Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [gossip.comm] Send -> DEBU 310f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9695688311555706345 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3110 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9695688311555706345 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3111 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3112 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3113 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7896500689143047538 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3114 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3115 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:357036938197498236 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3116 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3117 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10766680169397763346 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3118 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10766680169397763346 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3119 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7896500689143047538 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:357036938197498236 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.comm] sendToEndpoint -> DEBU 311d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.comm] func1 -> DEBU 311e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 311f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3120 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3122 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3123 Verify: digest = 00000000 48 53 ee 5c 4c 3e e4 d3 4e 8f 96 84 9a ac a3 8d |HS.\L>..N.......|
peer0.org1.example.com | 00000010 ed 53 4d 86 94 cc 76 25 b4 41 f7 f1 89 1d d7 b0 |.SM...v%.A......|"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3124 Verify: sig = 00000000 30 45 02 21 00 9c d7 15 31 f6 45 24 c3 70 48 39 |0E.!....1.E$.pH9|
peer0.org1.example.com | 00000010 ae bd b8 f1 03 40 47 26 45 f2 76 4d f6 20 3c ee |.....@G&E.vM. <.|
peer0.org1.example.com | 00000020 bc 6c 4f 63 5c 02 20 33 c3 d3 9b c6 0f 71 67 02 |.lOc\. 3.....qg.|
peer0.org1.example.com | 00000030 11 1b cb a9 22 ac 27 48 24 82 57 36 a3 96 3e c0 |....".'H$.W6..>.|
peer0.org1.example.com | 00000040 40 aa 4c 75 58 84 2f |@.LuX./|"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3125 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3126 Verify: sig = 00000000 30 44 02 20 14 d7 8d c3 c1 30 71 df cd b8 41 10 |0D. .....0q...A.|
peer0.org1.example.com | 00000010 95 8d 4a c4 e4 23 5b 54 f9 c9 23 3d 93 17 3d ea |..J..#[T..#=..=.|
peer0.org1.example.com | 00000020 0e 20 c9 6d 02 20 27 65 aa 8c 81 7e 2f 11 d5 b1 |. .m. 'e...~/...|
peer0.org1.example.com | 00000030 cd d1 f1 44 cd 61 45 e4 ae 33 e8 c2 50 3d 9a 93 |...D.aE..3..P=..|
peer0.org1.example.com | 00000040 e5 ce bf 36 d4 17 |...6..|"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 3127 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3128 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3129 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 "
peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 312a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 "
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 312d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] sendMemResponse -> DEBU 312f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3131 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.comm] Send -> DEBU 3132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3133 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3134 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3135 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3136 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3137 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3138 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3139 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 313a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 313b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 313c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 313d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 313e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 313f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3140 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3141 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3142 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3143 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3144 0xc003d94e10 gate 1556789281715104400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3145 0xc003d94e10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3146 0xc003d94e10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3147 0xc003d94e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3148 0xc003d94e10 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3149 0xc003d94e10 gate 1556789281715104400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.discovery] sendMemResponse -> DEBU 314a Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.gossip] handleMessage -> DEBU 314d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 314e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 314f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3150 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3152 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.comm] func1 -> DEBU 3153 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3154 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3155 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3156 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3157 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3159 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 315a 0xc003d956d0 gate 1556789281724493100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315b 0xc003d956d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315c 0xc003d956d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315d 0xc003d956d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315e Verify: digest = 00000000 56 97 ff ce ca 60 9d ee 53 04 d7 ae 73 80 31 93 |V....`..S...s.1.|
peer0.org1.example.com | 00000010 9f d2 cf 79 d3 74 2a af c1 f1 19 59 62 42 52 50 |...y.t*....YbBRP|"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315f Verify: sig = 00000000 30 45 02 21 00 a5 ce 70 09 cf 42 3d 9d d1 55 cd |0E.!...p..B=..U.|
peer0.org1.example.com | 00000010 a7 2f 28 50 65 e8 72 4e bf 61 09 6b ae 51 04 59 |./(Pe.rN.a.k.Q.Y|
peer0.org1.example.com | 00000020 5a b9 2f bf 5d 02 20 1b 61 2d 29 13 9b b9 88 54 |Z./.]. .a-)....T|
peer0.org1.example.com | 00000030 21 6f 85 5e d0 c3 d7 89 83 29 f5 f5 0b a0 77 84 |!o.^.....)....w.|
peer0.org1.example.com | 00000040 0c 31 69 cf 79 7f e3 |.1i.y..|"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 3160 0xc003d956d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 3161 0xc003d956d0 gate 1556789281724493100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3162 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3163 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3164 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3165 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3166 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3167 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3168 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 "
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3169 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 "
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 316c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 316d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 316e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3170 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3171 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.comm] Send -> DEBU 3172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 3173 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.comm] sendToEndpoint -> DEBU 3174 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.726 UTC [gossip.comm] sendToEndpoint -> DEBU 3175 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3176 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.pull] HandleMessage -> DEBU 3177 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3178 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 3179 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] IsLeader -> DEBU 317a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100A1801 "
peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317c Sign: digest: 39011A784D8265CF26E4949B56D8EADCEAC3516E1B7DE5319533E33B891E4D76 "
peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 317d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3180 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3181 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [gossip.comm] Send -> DEBU 3182 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3183 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3184 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3185 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3186 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.803 UTC [gossip.comm] func1 -> DEBU 3187 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3188 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3189 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 318a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 318b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:03.806 UTC [msp] DeserializeIdentity -> DEBU 318c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 318d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:03.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3190 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3191 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:03.810 UTC [policies] Evaluate -> DEBU 3192 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:03.810 UTC [cauthdsl] func1 -> DEBU 3193 0xc00421efe0 gate 1556789283810632600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3194 0xc00421efe0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3195 0xc00421efe0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3197 0xc00421efe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3198 0xc00421efe0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:03.815 UTC [gossip.gossip] handleMessage -> DEBU 3196 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.817 UTC [cauthdsl] func1 -> DEBU 3199 0xc00421efe0 gate 1556789283810632600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.820 UTC [policies] Evaluate -> DEBU 319c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:03.821 UTC [cauthdsl] func1 -> DEBU 319d 0xc00421f820 gate 1556789283821644400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:03.822 UTC [cauthdsl] func2 -> DEBU 319e 0xc00421f820 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:03.823 UTC [cauthdsl] func2 -> DEBU 319f 0xc00421f820 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:03.824 UTC [cauthdsl] func2 -> DEBU 31a0 0xc00421f820 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:03.825 UTC [msp.identity] Verify -> DEBU 31a1 Verify: digest = 00000000 df 2b 57 44 7e 39 a4 59 4c 87 2a f5 02 ea f2 c8 |.+WD~9.YL.*.....|
peer0.org1.example.com | 00000010 7a 90 8d 5a b8 a9 a4 e6 b6 0f 58 df 95 34 dc ff |z..Z......X..4..|"
peer0.org1.example.com | "2019-05-02 09:28:03.826 UTC [msp.identity] Verify -> DEBU 31a2 Verify: sig = 00000000 30 45 02 21 00 c4 c1 07 41 6a d9 6c 75 ba b4 ee |0E.!....Aj.lu...|
peer0.org1.example.com | 00000010 5f 0b 0c 3a 5d fe a3 9c a4 19 b5 95 57 a0 53 51 |_..:].......W.SQ|
peer0.org1.example.com | 00000020 6b 1b 26 22 37 02 20 04 6d 8d 5a 22 8b f2 95 d5 |k.&"7. .m.Z"....|
peer0.org1.example.com | 00000030 3b 6d 58 87 6a 17 9b 80 f9 a7 1c 33 ec bc 9e 51 |;mX.j......3...Q|
peer0.org1.example.com | 00000040 ce da 4c 0c af 59 a8 |..L..Y.|"
peer0.org1.example.com | "2019-05-02 09:28:03.828 UTC [cauthdsl] func2 -> DEBU 31a3 0xc00421f820 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:03.829 UTC [cauthdsl] func1 -> DEBU 31a4 0xc00421f820 gate 1556789283821644400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:03.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 31a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.834 UTC [gossip.discovery] learnExistingMembers -> DEBU 31aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:03.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ab updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 "
peer0.org1.example.com | "2019-05-02 09:28:03.836 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 "
peer0.org1.example.com | "2019-05-02 09:28:03.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:03.838 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ae Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 31af Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31b0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.843 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31b7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.846 UTC [gossip.comm] sendToEndpoint -> DEBU 31be Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.847 UTC [gossip.gossip] handleMessage -> DEBU 31c0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.849 UTC [gossip.gossip] handleMessage -> DEBU 31c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.gossip] handleMessage -> DEBU 31c4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c7 Got block validation policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation =="
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers =="
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func1 -> DEBU 31cb 0xc00426f550 gate 1556789284049776900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cc 0xc00426f550 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cd 0xc00426f550 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31ce 0xc00426f550 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31cf Verify: digest = 00000000 d4 e6 12 2a c2 c7 5b 23 94 4d f6 22 c9 25 13 0f |...*..[#.M.".%..|
peer0.org1.example.com | 00000010 c1 12 c9 e8 b1 26 4c de 4b 77 d2 92 4b 51 b6 14 |.....&L.Kw..KQ..|"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31d0 Verify: sig = 00000000 30 45 02 21 00 d4 df 00 4d 03 fb af 6e 74 41 d9 |0E.!....M...ntA.|
peer0.org1.example.com | 00000010 64 60 25 3a 01 68 00 be d9 80 46 4a 39 aa b6 6c |d`%:.h....FJ9..l|
peer0.org1.example.com | 00000020 79 f3 2e e6 ee 02 20 69 59 df 5b e5 20 00 55 b5 |y..... iY.[. .U.|
peer0.org1.example.com | 00000030 36 5d db dc dd 7e dd 8e 2e 81 11 c2 7d 37 34 c3 |6]...~......}74.|
peer0.org1.example.com | 00000040 d1 c1 f1 c3 82 03 fe |.......|"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [cauthdsl] func2 -> DEBU 31d1 0xc00426f550 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [cauthdsl] func1 -> DEBU 31d2 0xc00426f550 gate 1556789284049776900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d5 Signature set satisfies policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [blocksProvider] DeliverBlocks -> DEBU 31d7 [businesschannel] Adding payload to local buffer, blockNum = [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d8 [businesschannel] Adding payload to local buffer, blockNum = [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d9 Blocks payloads buffer size for channel [businesschannel] is 1 blocks"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [blocksProvider] DeliverBlocks -> DEBU 31da [businesschannel] Gossiping block [9], peers number [3]"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.channel] AddToMsgStore -> DEBU 31db Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to the block puller"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.pull] Add -> DEBU 31dc Added 9, total items: 9"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31dd [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31de [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger"
peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.privdata] StoreBlock -> INFO 31df [businesschannel] Received block [9] from buffer"
peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [gossip.privdata] StoreBlock -> DEBU 31e0 [businesschannel] Validating block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e1 [businesschannel] START Block Validation for block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e2 expecting 1 block validation responses"
peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] validateTx -> DEBU 31e3 [businesschannel] validateTx starts for block 0xc0033af8c0 env 0xc0023f2190 txn 0"
peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [protoutils] ValidateTransaction -> DEBU 31e4 ValidateTransactionEnvelope starts for envelope 0xc0023f2190"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] ValidateTransaction -> DEBU 31e5 Header is channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" "
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] validateChannelHeader -> DEBU 31e6 validateChannelHeader info: header type 1"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] checkSignatureFromCreator -> DEBU 31e7 begin"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp] GetManagerForChain -> DEBU 31e8 Returning existing manager for channel 'businesschannel'"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp] DeserializeIdentity -> DEBU 31e9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp.identity] newIdentity -> DEBU 31ea Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
peer0.org1.example.com | QQ==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp.identity] Sign -> DEBU 31eb Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151022 "
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ec Sign: digest: 5B60D2C483522D448385F8ECC85BE48D24592C7B9EE0507D39B1BBA9FCB594AC "
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31ed creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}"
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ee Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp] Validate -> DEBU 31ef MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31f0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [gossip.discovery] periodicalSendAlive -> DEBU 31f1 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f2 creator is valid"
peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f3 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.|
peer0.org1.example.com | 00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|"
peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f4 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..|
peer0.org1.example.com | 00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q|
peer0.org1.example.com | 00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&|
peer0.org1.example.com | 00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y|
peer0.org1.example.com | 00000040 9b 10 bb ec fa 93 92 |.......|"
peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f5 exits successfully"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [protoutils] validateConfigTransaction -> DEBU 31f6 validateConfigTransaction starts for data 0xc004578000, header channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" "
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [committer.txvalidator] validateTx -> DEBU 31f7 Transaction is for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f8 Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f9 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fa Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [msp] DeserializeIdentity -> DEBU 31fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fc Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 31ff Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3200 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 3201 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3202 Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3203 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3204 Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3205 Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3207 Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [gossip.comm] Send -> DEBU 3206 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3208 Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3209 Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320b Adding to config map: [Group] /Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3210 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3211 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3212 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3213 Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3214 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3215 Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3216 Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3217 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3218 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3219 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321a Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321b Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 321d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321e Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321f Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3220 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3221 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3222 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3223 Processing change to key: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] policyForItem -> DEBU 3224 Getting policy for item Application with mod_policy Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3225 Manager Channel looking up path []"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3226 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3227 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3228 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3229 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.059 UTC [policies] Manager -> DEBU 322e Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 322f Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3230 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3231 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3232 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.072 UTC [policies] Manager -> DEBU 3233 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 3234 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins =="
peer0.org1.example.com | "2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3235 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3236 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins =="
peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] deduplicate -> WARN 3237 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 3238 0xc00036a2d0 gate 1556789284075449700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 3239 0xc00036a2d0 signed by 0 principal evaluation starts (used [false false false])"
peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 323a 0xc00036a2d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 323b Checking if identity satisfies ADMIN role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 323c 0xc00036a2d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323d Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.|
peer0.org1.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|"
peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323e Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.|
peer0.org1.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..|
peer0.org1.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.|
peer0.org1.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N..<cu)/.a5....|
peer0.org1.example.com | 00000040 d4 0a 92 0d 83 df 89 |.......|"
peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 323f 0xc00036a2d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3240 0xc00036a2d0 gate 1556789284075449700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3241 Signature set satisfies policy /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3242 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins =="
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] deduplicate -> WARN 3244 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3245 0xc00036a9c0 gate 1556789284077249100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3246 0xc00036a9c0 signed by 0 principal evaluation starts (used [false false false])"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3247 0xc00036a9c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3248 0xc00036a9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3249 0xc00036a9c0 processing identity 1 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 324a Checking if identity satisfies ADMIN role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324b 0xc00036a9c0 principal matched by identity 1"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324c Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."|
peer0.org1.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324d Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..|
peer0.org1.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#|
peer0.org1.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..|
peer0.org1.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k|
peer0.org1.example.com | 00000040 a3 af 89 d2 b2 af |......|"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324e 0xc00036a9c0 principal evaluation succeeds for identity 1"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 324f 0xc00036a9c0 gate 1556789284077249100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3250 Signature set satisfies policy /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3251 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3252 Signature set satisfies policy /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3253 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [common.configtx] verifyDeltaSet -> DEBU 3254 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3255 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3256 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3257 Processing change to key: [Group] /Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3258 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3259 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325a Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325b Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325c Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325d Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325e Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325f Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3260 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3261 Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3262 Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3263 Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3264 Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3265 Setting policy for key Endorsement to "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3266 Setting policy for key LifecycleEndorsement to "
peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3267 Setting policy for key Readers to "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3268 Setting policy for key Writers to "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3269 Setting policy for key Admins to "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326a Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326b Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326c Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326d Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326e Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326f Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3270 Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3271 Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3272 Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.configtx] recurseConfigMap -> DEBU 3273 Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" "
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 3274 Initializing protos for *channelconfig.ChannelProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3275 Processing field: HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3276 Processing field: BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3277 Processing field: OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3278 Processing field: Consortium"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3279 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327a Initializing protos for *channelconfig.ApplicationProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327b Processing field: ACLs"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327c Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327d Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327e Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] NewStandardValues -> DEBU 327f Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3280 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] Validate -> DEBU 3281 Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 > "
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] validateMSP -> DEBU 3282 Setting up MSP for org Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] newBccspMsp -> DEBU 3283 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] New -> DEBU 3284 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] Setup -> DEBU 3285 Setting up MSP instance Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp.identity] newIdentity -> DEBU 3286 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O
peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv
peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.104 UTC [msp.identity] newIdentity -> DEBU 3287 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3288 Checking if identity satisfies role [CLIENT] for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] Validate -> DEBU 3289 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328a MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] hasOURole -> DEBU 328b MSP Org2MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328c MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328d Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 328e Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328f Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3290 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] Validate -> DEBU 3291 Anchor peers for org Org3MSP are "
peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] validateMSP -> DEBU 3292 Setting up MSP for org Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] newBccspMsp -> DEBU 3293 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] New -> DEBU 3294 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] Setup -> DEBU 3295 Setting up MSP instance Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3296 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB
peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw
peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc
peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3297 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y
peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr
peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky
peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV
peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO
peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ
peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI=
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3298 Checking if identity satisfies role [CLIENT] for Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] Validate -> DEBU 3299 MSP Org3MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329a MSP Org3MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] hasOURole -> DEBU 329b MSP Org3MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329c MSP Org3MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329d Initializing protos for *channelconfig.ApplicationOrgProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 329e Processing field: AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329f Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32a0 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] Validate -> DEBU 32a1 Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 > "
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] validateMSP -> DEBU 32a2 Setting up MSP for org Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] newBccspMsp -> DEBU 32a3 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] New -> DEBU 32a4 Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] Setup -> DEBU 32a5 Setting up MSP instance Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a6 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a7 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 32a8 Checking if identity satisfies role [CLIENT] for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] Validate -> DEBU 32a9 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] getCertificationChain -> DEBU 32aa MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] hasOURole -> DEBU 32ab MSP Org1MSP checking if the identity is a client"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] getCertificationChain -> DEBU 32ac MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32ad Initializing protos for *channelconfig.OrdererProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32ae Processing field: ConsensusType"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32af Processing field: BatchSize"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b0 Processing field: BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b1 Processing field: KafkaBrokers"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b2 Processing field: ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b3 Processing field: Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b4 Initializing protos for *channelconfig.OrdererOrgProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b5 Processing field: Endpoints"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b6 Initializing protos for *channelconfig.OrganizationProtos"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b7 Processing field: MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] validateMSP -> DEBU 32b8 Setting up MSP for org OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] newBccspMsp -> DEBU 32b9 Creating BCCSP-based MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] New -> DEBU 32ba Creating Cache-MSP instance"
peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] Setup -> DEBU 32bb Setting up MSP instance OrdererMSP"
peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bc Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68
peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr
peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh
peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk
peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bd Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp] Validate -> DEBU 32be MSP OrdererMSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 32bf Setting up the MSP manager (4 msps)"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [msp] Setup -> DEBU 32c0 MSP manager setup complete, setup 4 msps"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c1 Proposed new policy Admins for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c2 Proposed new policy Endorsement for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c3 Proposed new policy Readers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c4 Proposed new policy Writers for Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c5 Proposed new policy Admins for Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c6 Proposed new policy Endorsement for Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c7 Proposed new policy Readers for Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c8 Proposed new policy Writers for Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c9 Proposed new policy Readers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ca Proposed new policy Writers for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cb Proposed new policy Admins for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cc Proposed new policy Endorsement for Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cd Proposed new policy LifecycleEndorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ce Proposed new policy Readers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cf Proposed new policy Writers for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d0 Proposed new policy Admins for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d1 Proposed new policy Endorsement for Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d2 Proposed new policy Admins for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d3 Proposed new policy Readers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d4 Proposed new policy Writers for Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d5 Proposed new policy Readers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d6 Proposed new policy Writers for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d7 Proposed new policy Admins for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d8 Proposed new policy BlockValidation for Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d9 Proposed new policy Admins for Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32da Proposed new policy Readers for Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32db Proposed new policy Writers for Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dc Adding to config map: [Group] /Channel"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dd Adding to config map: [Group] /Channel/Application"
peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32de Adding to config map: [Group] /Channel/Application/Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32df Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e5 Adding to config map: [Group] /Channel/Application/Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e6 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ea Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32eb Adding to config map: [Group] /Channel/Application/Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ec Adding to config map: [Value] /Channel/Application/Org1MSP/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ed Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ee Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [common.configtx] addToMap -> DEBU 32f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.139 UTC [gossip.comm] func1 -> DEBU 32f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f7 Verify: digest = 00000000 75 83 f6 94 57 c7 45 0f 0e 53 f0 09 37 54 0f de |u...W.E..S..7T..|
peer0.org1.example.com | 00000010 19 8a 7b 91 0a f0 59 14 f2 2f d0 dd 2b 5e 82 3d |..{...Y../..+^.=|"
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f8 Verify: sig = 00000000 30 45 02 21 00 ee da e1 93 0a 08 cf 00 ba 07 2e |0E.!............|
peer0.org1.example.com | 00000010 43 46 5c 6a ab 97 5d 0c 16 00 c5 54 53 7a 69 9d |CF\j..]....TSzi.|
peer0.org1.example.com | 00000020 80 c3 9f bc 23 02 20 13 e3 48 2b 19 2c f4 2b 1f |....#. ..H+.,.+.|
peer0.org1.example.com | 00000030 1e 7b 63 88 ad 37 91 7a 40 f2 e5 cd 2e 3b ff 47 |.{c..7.z@....;.G|
peer0.org1.example.com | 00000040 2d 08 7f f0 9a f1 e9 |-......|"
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 "
peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 "
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fe Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ff Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3300 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3301 Adding to config map: [Value] /Channel/Application/ACLs"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3302 Adding to config map: [Value] /Channel/Application/Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3303 Adding to config map: [Policy] /Channel/Application/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3304 Adding to config map: [Policy] /Channel/Application/Endorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3305 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3306 Adding to config map: [Policy] /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3307 Adding to config map: [Policy] /Channel/Application/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3308 Adding to config map: [Group] /Channel/Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3309 Adding to config map: [Group] /Channel/Orderer/OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 330a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330f Adding to config map: [Value] /Channel/Orderer/Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3310 Adding to config map: [Value] /Channel/Orderer/ConsensusType"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3311 Adding to config map: [Value] /Channel/Orderer/BatchSize"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3312 Adding to config map: [Value] /Channel/Orderer/BatchTimeout"
peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3313 Adding to config map: [Policy] /Channel/Orderer/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3314 Adding to config map: [Policy] /Channel/Orderer/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3315 Adding to config map: [Policy] /Channel/Orderer/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3316 Adding to config map: [Policy] /Channel/Orderer/BlockValidation"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3317 Adding to config map: [Value] /Channel/Capabilities"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3318 Adding to config map: [Value] /Channel/HashingAlgorithm"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3319 Adding to config map: [Value] /Channel/Consortium"
peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 331a Adding to config map: [Value] /Channel/BlockDataHashingStructure"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331b Adding to config map: [Value] /Channel/OrdererAddresses"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331c Adding to config map: [Policy] /Channel/Admins"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331d Adding to config map: [Policy] /Channel/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331e Adding to config map: [Policy] /Channel/Writers"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 331f As expected, current configuration has policy '/Channel/Readers'"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 3320 As expected, current configuration has policy '/Channel/Writers'"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3321 Manager Channel looking up path [Application]"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3322 Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3323 Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3324 Manager Channel/Application looking up path []"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3325 Manager Channel/Application has managers Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3326 Manager Channel/Application has managers Org3MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3327 Manager Channel/Application has managers Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3328 As expected, current configuration has policy '/Channel/Application/Readers'"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3329 As expected, current configuration has policy '/Channel/Application/Writers'"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 332a As expected, current configuration has policy '/Channel/Application/Admins'"
peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 332b Manager Channel looking up path [Orderer]"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332c Manager Channel has managers Application"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332d Manager Channel has managers Orderer"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332e Manager Channel/Orderer looking up path []"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332f Manager Channel/Orderer has managers OrdererOrg"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [common.channelconfig] LogSanityChecks -> DEBU 3330 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'"
peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [common.capabilities] Supported -> DEBU 3331 Application capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [common.capabilities] Supported -> DEBU 3332 Channel capability V2_0 is supported and is enabled"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3333 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3334 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3335 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3336 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3337 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3338 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3339 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3340 Processing new config for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3341 Calling out because config was updated for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3342 Org3MSP anchor peers: []"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3343 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3344 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3345 Creating state provider for chainID businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [msp] DeserializeIdentity -> DEBU 3346 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3348 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 3349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 334a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [policies] Evaluate -> DEBU 334b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 334c 0xc00264f900 gate 1556789284154067400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334d 0xc00264f900 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334e 0xc00264f900 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334f 0xc00264f900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 3350 0xc00264f900 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 3351 0xc00264f900 gate 1556789284154067400 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3352 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3353 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func1 -> DEBU 3355 0xc002cf4140 gate 1556789284155465100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3356 0xc002cf4140 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3357 0xc002cf4140 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3358 0xc002cf4140 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 3359 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 335a Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 335b 0xc002cf4140 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 335c 0xc002cf4140 gate 1556789284155465100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3362 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3363 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3364 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3365 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3367 0xc002cf5220 gate 1556789284156479200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3368 0xc002cf5220 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3369 0xc002cf5220 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336a 0xc002cf5220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336b 0xc002cf5220 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 336c 0xc002cf5220 gate 1556789284156479200 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3370 0xc002cf5a60 gate 1556789284156813000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3371 0xc002cf5a60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3372 0xc002cf5a60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3373 0xc002cf5a60 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [msp.identity] Verify -> DEBU 3374 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3375 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3376 0xc002cf5a60 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3377 0xc002cf5a60 gate 1556789284156813000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3378 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3379 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3381 0xc00303ca40 gate 1556789284157548500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3382 0xc00303ca40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3383 0xc00303ca40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3384 0xc00303ca40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3385 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3386 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:04.158 UTC [cauthdsl] func2 -> DEBU 3387 0xc00303ca40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [cauthdsl] func1 -> DEBU 3388 0xc00303ca40 gate 1556789284157548500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 3389 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.gossip] JoinChan -> INFO 338d Joining gossip network of channel businesschannel with 3 organizations"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.gossip] learnAnchorPeers -> INFO 338e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]"
peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.discovery] Connect -> DEBU 338f Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata: "
peer0.org1.example.com | "2019-05-02 09:28:04.168 UTC [gossip.gossip] handleMessage -> DEBU 3390 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3391 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3392 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3393 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3394 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3395 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3396 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [msp] DeserializeIdentity -> DEBU 3397 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3398 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a1 0xc003606160 gate 1556789284180530600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a2 0xc003606160 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a3 0xc003606160 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a4 0xc003606160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a5 0xc003606160 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a6 0xc003606160 gate 1556789284180530600 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33aa 0xc0036069a0 gate 1556789284181093500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ab 0xc0036069a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ac 0xc0036069a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ad 0xc0036069a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33ae Verify: digest = 00000000 0a 22 f0 7b 96 0a ac bc d7 0f 52 c5 e3 cc 2d a7 |.".{......R...-.|
peer0.org1.example.com | 00000010 87 f1 1e e7 77 b1 c5 d6 72 23 4e 39 d5 c3 64 1a |....w...r#N9..d.|"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33af Verify: sig = 00000000 30 45 02 21 00 d1 90 5b 08 95 ac 58 ec af c0 89 |0E.!...[...X....|
peer0.org1.example.com | 00000010 f5 f6 33 11 d0 3c 01 85 5f f5 b2 89 e3 01 10 a1 |..3..<.._.......|
peer0.org1.example.com | 00000020 17 9c 39 be a5 02 20 2f 7b e5 7d 75 6b ea 70 e8 |..9... /{.}uk.p.|
peer0.org1.example.com | 00000030 59 f6 4d 65 e8 f0 fb 0d 6f f3 e9 7b 21 32 56 c7 |Y.Me....o..{!2V.|
peer0.org1.example.com | 00000040 0b 25 7e 5c fe c9 fd |.%~\...|"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33b0 0xc0036069a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33b1 0xc0036069a0 gate 1556789284181093500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b4 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 "
peer0.org1.example.com | "2019-05-02 09:28:04.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ba Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:04.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 33bc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33bd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.172 UTC [gossip.gossip] handleMessage -> DEBU 3399 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [grpc] DialContext -> DEBU 339b parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:28:04.196 UTC [grpc] DialContext -> DEBU 33be scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:28:04.169 UTC [gossip.discovery] Connect -> DEBU 339a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33bf No configured anchor peers of Org3MSP for channel businesschannel to learn about"
peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33c0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]"
peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [grpc] UpdateState -> DEBU 33c1 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [grpc] switchBalancer -> DEBU 33c2 ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [grpc] HandleSubConnStateChange -> DEBU 33c3 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [msp] DeserializeIdentity -> DEBU 33c4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33cf Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.comm] func1 -> DEBU 33d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.220 UTC [comm.grpc.server] 1 -> INFO 33d7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.219Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=180.2µs
peer0.org1.example.com | "2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33db Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33dc Anchor peer with same endpoint, skipping connecting to myself"
peer0.org1.example.com | "2019-05-02 09:28:04.225 UTC [gossip.service] updateEndpoints -> DEBU 33dd Updating endpoints for chainID%!(EXTRA string=businesschannel)"
peer0.org1.example.com | "2019-05-02 09:28:04.226 UTC [msp] DeserializeIdentity -> DEBU 33de Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.253 UTC [msp] DeserializeIdentity -> DEBU 33e0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33e1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.256 UTC [peer] updateTrustedRoots -> DEBU 33e2 Updating trusted root authorities for channel businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.261 UTC [msp.identity] Sign -> DEBU 33e3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.262 UTC [msp.identity] Sign -> DEBU 33e4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.268 UTC [grpc] HandleSubConnStateChange -> DEBU 33e5 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, READY"
peer0.org1.example.com | "2019-05-02 09:28:04.276 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33e6 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57068"
peer0.org1.example.com | "2019-05-02 09:28:04.277 UTC [msp.identity] Sign -> DEBU 33e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.278 UTC [msp.identity] Sign -> DEBU 33e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.278 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ea Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.283 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33eb Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:57068"
peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [grpc] infof -> DEBU 33ec transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [gossip.comm] readFromStream -> DEBU 33ed Got error, aborting: EOF"
peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [gossip.comm] func2 -> DEBU 33ee Client 172.18.0.9:42018 disconnected"
peer0.org1.example.com | "2019-05-02 09:28:04.285 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ef Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.297 UTC [msp] DeserializeIdentity -> DEBU 33f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.301 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.294 UTC [comm.grpc.server] 1 -> INFO 33f6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=41.3789506s
peer0.org1.example.com | "2019-05-02 09:28:04.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.276 UTC [msp] DeserializeIdentity -> DEBU 33e7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [gossip.comm] func1 -> DEBU 33f0 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [grpc] infof -> DEBU 33f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [msp] DeserializeIdentity -> DEBU 33f2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.304 UTC [gossip.comm] writeToStream -> DEBU 33f8 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.306 UTC [msp] DeserializeIdentity -> DEBU 33f9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.307 UTC [msp] DeserializeIdentity -> DEBU 33fa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.315 UTC [peer] buildTrustedRootsForChain -> DEBU 33fb updating root CAs for channel [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.318 UTC [comm.grpc.server] 1 -> INFO 33fc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.318Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.9µs
peer0.org1.example.com | "2019-05-02 09:28:04.316 UTC [gossip.gossip] handleMessage -> DEBU 33fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [gossip.comm] Send -> DEBU 3400 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.321 UTC [peer] buildTrustedRootsForChain -> DEBU 3401 adding app root CAs for MSP [Org1MSP]"
peer0.org1.example.com | "2019-05-02 09:28:04.322 UTC [gossip.gossip] handleMessage -> DEBU 3402 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3403 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.324 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3408 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:04.324 UTC [msp] DeserializeIdentity -> DEBU 3409 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 340a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [cauthdsl] func1 -> DEBU 3410 0xc00423e9d0 gate 1556789284327939700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3411 0xc00423e9d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3412 0xc00423e9d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3413 0xc00423e9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3414 0xc00423e9d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func1 -> DEBU 3415 0xc00423e9d0 gate 1556789284327939700 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3416 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3417 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3418 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.330 UTC [cauthdsl] func1 -> DEBU 3419 0xc00423f210 gate 1556789284330064200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.330 UTC [cauthdsl] func2 -> DEBU 341a 0xc00423f210 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [msp] DeserializeIdentity -> DEBU 3404 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [gossip.comm] sendToEndpoint -> DEBU 3406 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [peer] buildTrustedRootsForChain -> DEBU 3407 adding orderer root CAs for MSP [OrdererMSP]"
peer0.org1.example.com | "2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.334 UTC [cauthdsl] func2 -> DEBU 341d 0xc00423f210 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.337 UTC [msp.identity] Sign -> DEBU 341e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.340 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 341f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.340 UTC [gossip.comm] sendToEndpoint -> DEBU 3420 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.344 UTC [peer] buildTrustedRootsForChain -> DEBU 3421 adding app root CAs for MSP [Org2MSP]"
peer0.org1.example.com | "2019-05-02 09:28:04.344 UTC [gossip.comm] sendToEndpoint -> DEBU 3422 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.347 UTC [gossip.comm] createConnection -> DEBU 3423 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:04.349 UTC [cauthdsl] func2 -> DEBU 3424 0xc00423f210 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.350 UTC [msp.identity] Sign -> DEBU 3425 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.352 UTC [policies] Evaluate -> DEBU 3426 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.354 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3427 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.354 UTC [gossip.comm] func1 -> DEBU 3428 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.355 UTC [comm.grpc.server] 1 -> INFO 3429 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.354Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147µs
peer0.org1.example.com | "2019-05-02 09:28:04.355 UTC [peer] buildTrustedRootsForChain -> DEBU 342a adding app root CAs for MSP [Org3MSP]"
peer0.org1.example.com | "2019-05-02 09:28:04.357 UTC [msp.identity] Verify -> DEBU 342b Verify: digest = 00000000 6c 9b 11 78 32 10 3a c0 47 06 89 0f de 4e db a7 |l..x2.:.G....N..|
peer0.org1.example.com | 00000010 b6 2c d4 db 51 a0 a9 a4 a8 52 59 83 d5 0c 4e 8e |.,..Q....RY...N.|"
peer0.org1.example.com | "2019-05-02 09:28:04.360 UTC [gossip.comm] authenticateRemotePeer -> DEBU 342c Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53420"
peer0.org1.example.com | "2019-05-02 09:28:04.360 UTC [gossip.gossip] handleMessage -> DEBU 342d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.361 UTC [policies] Evaluate -> DEBU 342e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [msp] DeserializeIdentity -> DEBU 342f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [committer.txvalidator] validateTx -> DEBU 3430 config transaction received for chain businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [msp.identity] Verify -> DEBU 3431 Verify: sig = 00000000 30 44 02 20 38 57 22 43 d5 4e 72 41 bc e0 90 e4 |0D. 8W"C.NrA....|
peer0.org1.example.com | 00000010 6e 54 21 d2 52 29 95 d3 08 24 fe b4 28 ce 31 b3 |nT!.R)...$..(.1.|
peer0.org1.example.com | 00000020 64 21 b7 ab 02 20 3c df 10 32 c3 77 f1 d2 7d b2 |d!... <..2.w..}.|
peer0.org1.example.com | 00000030 71 16 ac a3 0f 99 fe f3 94 9e 90 04 54 39 58 b6 |q...........T9X.|
peer0.org1.example.com | 00000040 76 d0 a2 77 21 75 |v..w!u|"
peer0.org1.example.com | "2019-05-02 09:28:04.366 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3432 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53420"
peer0.org1.example.com | "2019-05-02 09:28:04.367 UTC [msp.identity] Verify -> DEBU 3433 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:04.367 UTC [grpc] DialContext -> DEBU 3434 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:28:04.368 UTC [policies] Evaluate -> DEBU 3435 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [msp] DeserializeIdentity -> DEBU 3436 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [grpc] infof -> DEBU 3437 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [committer.txvalidator] validateTx -> DEBU 3438 [businesschannel] validateTx completes for block 0xc0033af8c0 env 0xc0023f2190 txn 0"
peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [committer.txvalidator] Validate -> DEBU 3439 got result for idx 0, code 0"
peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [cauthdsl] func2 -> DEBU 343a 0xc00423f210 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.371 UTC [msp.identity] Verify -> DEBU 343b Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:28:04.372 UTC [msp.identity] Verify -> DEBU 343c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [grpc] DialContext -> DEBU 343d scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [msp.identity] Sign -> DEBU 343e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [cauthdsl] func1 -> DEBU 343f 0xc0042e9de0 gate 1556789284373865000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [msp.identity] newIdentity -> DEBU 3440 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c
peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv
peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr
peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [committer.txvalidator] Validate -> INFO 3441 [businesschannel] Validated block [9] in 323ms"
peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [cauthdsl] func1 -> DEBU 3442 0xc00423f210 gate 1556789284330064200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.376 UTC [msp.identity] Verify -> DEBU 3443 Verify: sig = 00000000 30 44 02 20 54 ba d4 9b 33 a4 a2 cb 1b 20 6a 8a |0D. T...3.... j.|
peer0.org1.example.com | 00000010 03 d7 18 00 49 e3 fa be 26 85 d5 2b a3 8d 0c 26 |....I...&..+...&|
peer0.org1.example.com | 00000020 3b 3e 2f 07 02 20 64 92 23 0c 74 f5 36 42 9e 61 |;>/.. d.#.t.6B.a|
peer0.org1.example.com | 00000030 98 3d 4c 56 c9 9e bc 68 4b cc 54 6b a2 90 67 32 |.=LV...hK.Tk..g2|
peer0.org1.example.com | 00000040 e2 41 2b 3c 81 6c |.A+<.l|"
peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [msp.identity] Verify -> DEBU 3444 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [grpc] UpdateState -> DEBU 3445 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [msp.identity] Sign -> DEBU 3446 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [cauthdsl] func2 -> DEBU 3447 0xc0042e9de0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.378 UTC [msp] Validate -> DEBU 3448 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.379 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3449 Retrieving private write sets for 0 transactions from transient store"
peer0.org1.example.com | "2019-05-02 09:28:04.379 UTC [policies] Evaluate -> DEBU 344a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [msp.identity] Verify -> DEBU 344b Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344c Authenticated 172.18.0.6:53420"
peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [grpc] switchBalancer -> DEBU 344d ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:28:04.381 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344e Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42206"
peer0.org1.example.com | "2019-05-02 09:28:04.381 UTC [cauthdsl] func2 -> DEBU 344f 0xc0042e9de0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [msp] getCertificationChain -> DEBU 3450 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [gossip.privdata] StoreBlock -> DEBU 3451 [businesschannel] No missing collection private write sets to fetch from remote peers"
peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [msp] DeserializeIdentity -> DEBU 3453 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [gossip.comm] GossipStream -> DEBU 3454 Servicing 172.18.0.6:53420"
peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [grpc] HandleSubConnStateChange -> DEBU 3455 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:28:04.385 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3456 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42206"
peer0.org1.example.com | "2019-05-02 09:28:04.385 UTC [cauthdsl] func2 -> DEBU 3457 0xc0042e9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.387 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3458 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.387 UTC [committer] preCommit -> DEBU 3459 Received configuration update, calling CSCC ConfigUpdate"
peer0.org1.example.com | "2019-05-02 09:28:04.388 UTC [policies] Evaluate -> DEBU 345a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.388 UTC [msp] DeserializeIdentity -> DEBU 345b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.389 UTC [gossip.comm] writeToStream -> DEBU 345c Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [gossip.comm] readFromStream -> DEBU 345d Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [grpc] infof -> DEBU 345e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [msp] DeserializeIdentity -> DEBU 345f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [cauthdsl] func2 -> DEBU 3460 0xc0042e9de0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3461 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [kvledger] CommitWithPvtData -> DEBU 3462 [businesschannel] Validating state for block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [policies] Evaluate -> DEBU 3463 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [msp.identity] newIdentity -> DEBU 3464 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe
peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c
peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI
peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] DeserializeIdentity -> DEBU 346b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] Validate -> DEBU 346c MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] getCertificationChain -> DEBU 346d MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 346e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 346f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3470 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3471 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3472 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3473 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func1 -> DEBU 3474 0xc003165b90 gate 1556789284394321400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3475 0xc003165b90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3476 0xc003165b90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3477 Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] Validate -> DEBU 3478 MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] getCertificationChain -> DEBU 3479 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347a 0xc003165b90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347b Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347c Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347d 0xc003165b90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func1 -> DEBU 347e 0xc003165b90 gate 1556789284394321400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3481 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3482 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3483 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3484 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3485 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3486 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3487 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3488 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3489 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func1 -> DEBU 348b 0xc00313d6e0 gate 1556789284397003900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348c 0xc00313d6e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348d 0xc00313d6e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 348e Checking if identity satisfies MEMBER role for Org2MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] Validate -> DEBU 348f MSP Org2MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] getCertificationChain -> DEBU 3490 MSP Org2MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3491 0xc00313d6e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3492 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3493 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3494 0xc00313d6e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func1 -> DEBU 3495 0xc00313d6e0 gate 1556789284397003900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3496 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3498 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3499 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [gossip.gossip] handleMessage -> DEBU 349a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [gossip.gossip] handleMessage -> DEBU 349b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp] DeserializeIdentity -> DEBU 349c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 349f Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 34a0 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [gossip.comm] func2 -> DEBU 34a2 Client 172.18.0.6:53420 disconnected"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [comm.grpc.server] 1 -> INFO 34a3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.335Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9613ms
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [gossip.comm] writeToStream -> DEBU 34a5 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [cauthdsl] func1 -> DEBU 34ac 0xc00341a3b0 gate 1556789284400975900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ad 0xc00341a3b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ae 0xc00341a3b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34af 0xc00341a3b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b0 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..|
peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b1 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.|
peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...|
peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.|
peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....|
peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34b2 0xc00341a3b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func1 -> DEBU 34b3 0xc00341a3b0 gate 1556789284400975900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.402 UTC [grpc] HandleSubConnStateChange -> DEBU 34b6 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, READY"
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [gossip.comm] serviceConnection -> DEBU 3465 Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:28:04.402 UTC [gossip.comm] func2 -> DEBU 34b7 Client 172.18.0.6:53224 disconnected"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [comm.grpc.server] 1 -> INFO 34b8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.8966157s
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [cauthdsl] func1 -> DEBU 3467 0xc0042e9de0 gate 1556789284373865000 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func1 -> DEBU 34bc 0xc003459080 gate 1556789284403603300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34bd 0xc003459080 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34be 0xc003459080 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34bf 0xc003459080 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c0 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c1 Verify: sig = 00000000 30 45 02 21 00 91 b9 ca 97 ad 28 01 e4 1f 2d a4 |0E.!......(...-.|
peer0.org1.example.com | 00000010 31 06 fe f6 0c 30 1e fe c0 1b 8c c7 15 3f 8b 03 |1....0.......?..|
peer0.org1.example.com | 00000020 fa 68 27 2b 15 02 20 75 68 b3 5a 59 3a 3e c1 76 |.h'+.. uh.ZY:>.v|
peer0.org1.example.com | 00000030 4b 5c d5 59 a5 e4 62 91 e4 a6 70 37 67 10 83 84 |K\.Y..b...p7g...|
peer0.org1.example.com | 00000040 85 ff d3 5a a2 0c f4 |...Z...|"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34c2 0xc003459080 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func1 -> DEBU 34c3 0xc003459080 gate 1556789284403603300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c8 Authenticated 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34ca Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151027 "
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cb Sign: digest: 469FBC171A97132299A85FD1EFA9BED2C2A44D77EF8DD074607E47FEA82F0189 "
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34ce Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] Send -> DEBU 34cf Entering, sending GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] sendToEndpoint -> DEBU 34d0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] readFromStream -> DEBU 34d1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func1 -> DEBU 34d5 0xc00373eab0 gate 1556789284406645700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d6 0xc00373eab0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d7 0xc00373eab0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d8 0xc00373eab0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34d9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34da Verify: sig = 00000000 30 44 02 20 64 fa 7b a8 f7 01 b8 ff 50 55 19 63 |0D. d.{.....PU.c|
peer0.org1.example.com | 00000010 7d 3b f8 9e d0 55 30 ae 22 bc 9b 8e e2 aa 95 b6 |};...U0.".......|
peer0.org1.example.com | 00000020 cb 89 c7 13 02 20 2a 1b 2f db b7 7a ab a4 c4 fa |..... *./..z....|
peer0.org1.example.com | 00000030 1a 94 62 88 ac 2f 25 f4 37 62 9b e4 a3 21 82 38 |..b../%.7b...!.8|
peer0.org1.example.com | 00000040 fa 52 69 12 f2 f9 |.Ri...|"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [cauthdsl] func2 -> DEBU 34db 0xc00373eab0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [cauthdsl] func1 -> DEBU 34dc 0xc00373eab0 gate 1556789284406645700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34df Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34e1 Authenticated 172.18.0.5:57068"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] GossipStream -> DEBU 34e2 Servicing 172.18.0.5:57068"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] writeToStream -> DEBU 34e3 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3469 Waiting for purge mgr to finish the background job of computing expirying keys for the block"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e4 lock acquired on oldBlockCommit for validating read set version against the committed version"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e5 Validating new block with num trans = [1]"
peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e6 ValidateAndPrepareBatch() for block number = [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e7 preprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] preprocessProtoBlock -> DEBU 34e8 txType=CONFIG"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34e9 Performing custom processing for transaction [txid=], [txType=CONFIG]"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34ea Processor for custom tx processing:&peer.configtxProcessor{}"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 34eb constructing new tx simulator"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 34ec constructing new tx simulator txid = []"
peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [peer] GenerateSimulationResults -> DEBU 34ed Processing CONFIG"
peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [peer] processChannelConfigTx -> DEBU 34ee channelConfig=sequence:4 channel_group:<groups:<key:"Application" value:<version:2 groups:<key:"Org1MSP" value:<version:1 values:<key:"AnchorPeers" value:<value:"\n\033\n\026peer0.org1.example.com\020\2137" mod_policy:"Admins" > > values:<key:"MSP" value:<value:"\022\363!\n\007Org1MSP\022\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7\ntTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E\nAwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\nZ\332\r\010\001\022\352\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\006client\032\350\006\n\337\006-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Org2MSP" value:<version:1 values:<key:"AnchorPeers" value:<value:"\n\033\n\026peer0.org2.example.com\020\2137" mod_policy:"Admins" > > values:<key:"MSP" value:<value:"\022\377!\n\007Org2MSP\022\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\"\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\nZ\342\r\010\001\022\356\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\006client\032\354\006\n\343\006-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Org3MSP" value:<values:<key:"MSP" value:<value:"\022\373!\n\007Org3MSP\022\343\006-----BEGIN CERTIFICATE-----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\nCB8UKt+GsH3/7ADrNo7ofOg7BzMonw==\n-----END CERTIFICATE-----\n\"\252\006-----BEGIN CERTIFICATE-----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\nR32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI=\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\347\006-----BEGIN CERTIFICATE-----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\nSUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE=\n-----END CERTIFICATE-----\nZ\342\r\010\001\022\356\006\n\343\006-----BEGIN CERTIFICATE-----\nMIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB\n6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\nrzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw\nRQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc\nCB8UKt+GsH3/7ADrNo7ofOg7BzMonw==\n-----END CERTIFICATE-----\n\022\006client\032\354\006\n\343\006-----BEGIN CERTIFICATE-----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\nCB8UKt+GsH3/7ADrNo7ofOg7BzMonw==\n-----END CERTIFICATE-----\n\022\004peer" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"ACLs" value:<value:"\n.\n\014peer/Propose\022\036\n\034/Channel/Application/Writers\n4\n\022cscc/GetConfigTree\022\036\n\034/Channel/Application/Readers\nF\n$_lifecycle/CommitChaincodeDefinition\022\036\n\034/Channel/Application/Writers\nF\n$_lifecycle/QueryNamespaceDefinitions\022\036\n\034/Channel/Application/Readers\n5\n\023event/FilteredBlock\022\036\n\034/Channel/Application/Readers\n7\n\025lscc/GetChaincodeData\022\036\n\034/Channel/Application/Readers\n?\n\035cscc/SimulateConfigTreeUpdate\022\036\n\034/Channel/Application/Readers\n6\n\024lscc/ChaincodeExists\022\036\n\034/Channel/Application/Readers\n5\n\023cscc/GetConfigBlock\022\036\n\034/Channel/Application/Readers\n9\n\027qscc/GetTransactionByID\022\036\n\034/Channel/Application/Readers\n7\n\025qscc/GetBlockByNumber\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByHash\022\036\n\034/Channel/Application/Readers\nE\n#_lifecycle/QueryChaincodeDefinition\022\036\n\034/Channel/Application/Readers\n3\n\021qscc/GetChainInfo\022\036\n\034/Channel/Application/Readers\n;\n\031peer/ChaincodeToChaincode\022\036\n\034/Channel/Application/Readers\n@\n\036lscc/GetInstantiatedChaincodes\022\036\n\034/Channel/Application/Readers\n8\n\026lscc/GetDeploymentSpec\022\036\n\034/Channel/Application/Readers\n-\n\013event/Block\022\036\n\034/Channel/Application/Readers\n5\n\023qscc/GetBlockByTxID\022\036\n\034/Channel/Application/Readers" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Endorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"LifecycleEndorsement" value:<policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > groups:<key:"Orderer" value:<groups:<key:"OrdererOrg" value:<values:<key:"MSP" value:<value:"\022\267\023\n\nOrdererMSP\022\302\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n\"\201\006-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\nB\016\n\004SHA2\022\006SHA256J\317\006-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BatchSize" value:<value:"\010\364\003\020\200\200\200\005\030\200\200\200\001" mod_policy:"Admins" > > values:<key:"BatchTimeout" value:<value:"\n\0022s" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"ChannelRestrictions" value:<mod_policy:"Admins" > > values:<key:"ConsensusType" value:<value:"\n\010etcdraft\022\224*\n\375\r\n\024orderer0.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer1.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n\n\375\r\n\024orderer2.example.com\020\2127\032\357\006-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2\nfsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\"\357\006-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n\022\022\n\005500ms\020\n\030\001 \005(\200\200\200\n" mod_policy:"Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"BlockValidation" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > > values:<key:"BlockDataHashingStructure" value:<value:"\010\377\377\377\377\017" mod_policy:"Admins" > > values:<key:"Capabilities" value:<value:"\n\010\n\004V2_0\022\000" mod_policy:"Admins" > > values:<key:"Consortium" value:<value:"\n\020SampleConsortium" mod_policy:"Admins" > > values:<key:"HashingAlgorithm" value:<value:"\n\006SHA256" mod_policy:"Admins" > > values:<key:"OrdererAddresses" value:<value:"\n\031orderer0.example.com:7050\n\031orderer1.example.com:7050\n\031orderer2.example.com:7050" mod_policy:"/Channel/Orderer/Admins" > > policies:<key:"Admins" value:<policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins" > > policies:<key:"Readers" value:<policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins" > > policies:<key:"Writers" value:<policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins" > > mod_policy:"Admins" > "
peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 34ef Simulation completed, getting simulation results"
peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] Done -> DEBU 34f0 Done with transaction simulation / query execution []"
peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 34f1 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [valinternal] ApplyWriteSet -> DEBU 34f2 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002549380)}"
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f3 validating rwset..."
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [msp] DeserializeIdentity -> DEBU 3466 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f4 postprocessing ProtoBlock..."
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f5 ValidateAndPrepareBatch() complete"
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [kvledger] CommitWithPvtData -> DEBU 34f6 [businesschannel] Committing block [9] to storage"
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [ledgerstorage] CommitWithPvtData -> DEBU 34f7 Writing block [9] to pvt block store"
peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [msp.identity] newIdentity -> DEBU 34f8 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe
peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c
peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E
peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI
peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34fe Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ff Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3500 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3501 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3502 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 3503 0xc003246da0 gate 1556789284412996700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3504 0xc003246da0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3505 0xc003246da0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3506 0xc003246da0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3507 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3508 Verify: sig = 00000000 30 45 02 21 00 b4 65 91 85 7e a4 72 50 cf d4 3a |0E.!..e..~.rP..:|
peer0.org1.example.com | 00000010 6b 92 51 e5 cc 75 ad 3a 9a 6b 1c 9c 1d e8 db e1 |k.Q..u.:.k......|
peer0.org1.example.com | 00000020 83 f1 1e d3 91 02 20 38 61 b4 a2 e3 7e 13 84 44 |...... 8a...~..D|
peer0.org1.example.com | 00000030 2a 51 3c f4 fc 6b bf 85 b2 75 82 90 68 75 3e 65 |*Q<..k...u..hu>e|
peer0.org1.example.com | 00000040 e7 1b 9f 95 8c d0 6b |......k|"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3509 0xc003246da0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 350a 0xc003246da0 gate 1556789284412996700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [pvtdatastorage] Prepare -> DEBU 350b Saved 0 private data write sets for block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [policies] Evaluate -> DEBU 350c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3510 Authenticated 172.18.0.9:42206"
peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [gossip.comm] GossipStream -> DEBU 3511 Servicing 172.18.0.9:42206"
peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [gossip.comm] readFromStream -> DEBU 3512 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [gossip.comm] func2 -> DEBU 3513 Client 172.18.0.9:42206 disconnected"
peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [comm.grpc.server] 1 -> INFO 3514 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.372Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.6834ms
peer0.org1.example.com | "2019-05-02 09:28:04.416 UTC [gossip.comm] writeToStream -> DEBU 3515 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.416 UTC [grpc] infof -> DEBU 3516 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3517 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3518 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3519 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 351a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [policies] Evaluate -> DEBU 351b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 351e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 351f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3520 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func1 -> DEBU 3524 0xc002f55260 gate 1556789284420649300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3525 0xc002f55260 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3526 0xc002f55260 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3527 0xc002f55260 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3528 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3529 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [cauthdsl] func2 -> DEBU 352a 0xc002f55260 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [cauthdsl] func1 -> DEBU 352b 0xc002f55260 gate 1556789284420649300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3531 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3532 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3533 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets=
peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=33870
peer0.org1.example.com | ]"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3534 txid [] is a duplicate of a previous tx. Not indexing in txid-index"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3535 Adding txLoc [fileSuffixNum=0, offset=98744, bytesLength=33870] for tx number:[0] ID: [] to blockNumTranNum index"
peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 3536 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3537 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func1 -> DEBU 3539 0xc00448c340 gate 1556789284422433700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353a 0xc00448c340 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353b 0xc00448c340 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353c 0xc00448c340 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353d Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353e Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [cauthdsl] func2 -> DEBU 353f 0xc00448c340 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [cauthdsl] func1 -> DEBU 3540 0xc00448c340 gate 1556789284422433700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3541 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3543 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [gossip.gossip] handleMessage -> DEBU 3545 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [fsblkstorage] updateCheckpoint -> DEBU 3546 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133552], isChainEmpty=[false], lastBlockNumber=[9]"
peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [pvtdatastorage] Commit -> DEBU 3547 Committing private data for block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3549 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [msp] DeserializeIdentity -> DEBU 354a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [pvtdatastorage] Commit -> DEBU 354b Committed private data for block [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [kvledger] CommitWithPvtData -> DEBU 354c [businesschannel] Committing block [9] transactions to state database"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354d lock acquired on oldBlockCommit for committing regular updates to state database"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354e Committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 354f Building the expiry schedules based on the update batch"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3550 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [lockbasedtxmgr] Commit -> DEBU 3551 Write lock acquired for committing updates to state database"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3552 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [stateleveldb] ApplyUpdates -> DEBU 3553 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3554 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3555 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3557 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3558 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 3559 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 355c 0xc000244bc0 gate 1556789284430008600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355d 0xc000244bc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355e 0xc000244bc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355f 0xc000244bc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3560 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3561 Verify: sig = 00000000 30 45 02 21 00 99 9f 28 b3 c8 5a 89 ae 0c 49 3b |0E.!...(..Z...I;|
peer0.org1.example.com | 00000010 12 fa cc 29 11 5c 53 29 20 29 0e 9f 28 61 5d ed |...).\S) )..(a].|
peer0.org1.example.com | 00000020 ae 03 53 d5 8f 02 20 6d a9 89 9e 36 78 8d 81 72 |..S... m...6x..r|
peer0.org1.example.com | 00000030 4d 0a 4f 7a 27 e0 5e 0e 71 98 ab eb ef 60 79 fb |M.Oz'.^.q....`y.|
peer0.org1.example.com | 00000040 4a c4 a5 e7 66 02 ef |J...f..|"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 3562 0xc000244bc0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 3563 0xc000244bc0 gate 1556789284430008600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3564 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3566 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [lockbasedtxmgr] Commit -> DEBU 3567 Updates committed to state database and the write lock is released"
peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3568 Preparing potential purge list working-set for expiringAtBlk [10]"
peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [leveldbhelper] GetIterator -> DEBU 3569 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]"
peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 356a No expiry entry found for expiringAtBlk [10]"
peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [lockbasedtxmgr] func1 -> DEBU 356b launched the background routine for preparing keys to purge with the next block"
peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [kvledger] CommitWithPvtData -> DEBU 356c [businesschannel] Committing block [9] transactions to history database"
peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356d Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions"
peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356e Skipping transaction [0] since it is not an endorsement transaction"
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [historyleveldb] Commit -> DEBU 356f Channel [businesschannel]: Updates committed to history database for blockNo [9]"
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [kvledger] CommitWithPvtData -> INFO 3570 [businesschannel] Committed block [9] with 1 transaction(s) in 43ms (state_validation=19ms block_commit=18ms state_commit=3ms)"
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3571 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A02080A "
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3572 Sign: digest: 5A6ADC83E89FA0299A699739CD6E79AAA80486E8AFEA08E44B48F1B1F8A0A2AD "
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [gossip.state] commitBlock -> DEBU 3573 [businesschannel] Committed block [9] with 1 transaction(s)"
peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [gossip.comm] serviceConnection -> DEBU 3574 Closing reading from stream"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3575 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3576 Got error, aborting: rpc error: code = Canceled desc = context canceled"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] func2 -> DEBU 3577 Client 172.18.0.5:57068 disconnected"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [comm.grpc.server] 1 -> INFO 3578 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.258Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=173.6968ms
peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] authenticateRemotePeer -> DEBU 357a Authenticated 172.18.0.9:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [gossip.discovery] handleAliveMessage -> DEBU 346a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] createConnection -> DEBU 357b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 357c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 "
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 "
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3580 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3581 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3582 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 3583 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3584 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3589 Got message: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:04.437 UTC [grpc] infof -> DEBU 3585 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358b Verify: digest = 00000000 ef 8f f9 c9 84 da a4 78 5c 6b 28 82 09 9e 01 15 |.......x\k(.....|
peer0.org1.example.com | 00000010 0a cd 9d cd 70 56 89 01 2c 81 69 06 ff 14 80 89 |....pV..,.i.....|"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358c Verify: sig = 00000000 30 45 02 21 00 be 0d e7 61 f0 f8 fc 7c 89 5e 8d |0E.!....a...|.^.|
peer0.org1.example.com | 00000010 16 63 bd cf cf 74 c6 d4 91 37 3a 0f 65 4f b5 fe |.c...t...7:.eO..|
peer0.org1.example.com | 00000020 82 9e b1 10 3c 02 20 53 d4 94 e8 4c 78 33 02 3e |....<. S...Lx3.>|
peer0.org1.example.com | 00000030 21 8d 15 ed 8e b4 18 73 cf 86 3b 00 69 be 1b 95 |!......s..;.i...|
peer0.org1.example.com | 00000040 1b 99 50 89 d8 5d 8a |..P..].|"
peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.comm] func1 -> DEBU 3586 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] func1 -> DEBU 358d Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.comm] writeToStream -> DEBU 3587 Closing writing to stream"
peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3588 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 358f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 3590 Verify: sig = 00000000 30 44 02 20 58 12 c4 7a e9 d9 77 95 af ce f8 07 |0D. X..z..w.....|
peer0.org1.example.com | 00000010 40 88 1b 14 a8 9d c4 7d 9e 22 70 72 0d 6e 63 97 |@......}."pr.nc.|
peer0.org1.example.com | 00000020 88 b1 17 db 02 20 46 12 d7 71 d0 a4 a1 b8 fe 39 |..... F..q.....9|
peer0.org1.example.com | 00000030 3c 38 cf 00 cc dd fb 10 8f 39 bd 81 58 1c 0f 1a |<8.......9..X...|
peer0.org1.example.com | 00000040 cd 3e 0b 27 43 06 |.>.'C.|"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3591 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 3592 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3593 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3594 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] Send -> DEBU 3595 Entering, sending GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3596 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] sendMemResponse -> DEBU 3597 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3598 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3599 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] createConnection -> DEBU 359b Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 359d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 359f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] Send -> DEBU 35a2 Entering, sending GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 35a3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] sendToEndpoint -> DEBU 35a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] createConnection -> DEBU 35a5 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a6 parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a7 scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35a8 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35a9 ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35aa pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ab parsed scheme: """
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ac scheme "" not registered, fallback to default scheme"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35ad ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 <nil>}] }"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35ae ClientConn switching balancer to "pick_first""
peer0.org1.example.com | "2019-05-02 09:28:04.447 UTC [grpc] HandleSubConnStateChange -> DEBU 35af pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, READY"
peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35b2 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35b3 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, CONNECTING"
peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [msp] DeserializeIdentity -> DEBU 35b6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b7 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......|
peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|"
peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b8 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..|
peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..|
peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......|
peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!|
peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|"
peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b9 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.|
peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|"
peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35ba Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b|
peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...|
peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........|
peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..|
peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|"
peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp] DeserializeIdentity -> DEBU 35bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [msp] DeserializeIdentity -> DEBU 35bc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35be Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35bf Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func1 -> DEBU 35c3 0xc0038f09e0 gate 1556789284458739100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c4 0xc0038f09e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c5 0xc0038f09e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c6 0xc0038f09e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c7 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.|
peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c8 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..|
peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..|
peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..|
peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...|
peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [cauthdsl] func2 -> DEBU 35c9 0xc0038f09e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [cauthdsl] func1 -> DEBU 35ca 0xc0038f09e0 gate 1556789284458739100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cd Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp] DeserializeIdentity -> DEBU 35cf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp] DeserializeIdentity -> DEBU 35d0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d2 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d3 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func1 -> DEBU 35d7 0xc0039281b0 gate 1556789284460649900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d8 0xc0039281b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d9 0xc0039281b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35da 0xc0039281b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35db Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35dc Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0039281b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [cauthdsl] func1 -> DEBU 35de 0xc0039281b0 gate 1556789284460649900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35df Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func1 -> DEBU 35e9 0xc003929290 gate 1556789284462225900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ea 0xc003929290 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35eb 0xc003929290 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ec 0xc003929290 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ed Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ee Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [cauthdsl] func2 -> DEBU 35ef 0xc003929290 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [cauthdsl] func1 -> DEBU 35f0 0xc003929290 gate 1556789284462225900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f6 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f8 Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35f9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [msp.identity] Verify -> DEBU 35fa Verify: digest = 00000000 46 9f bc 17 1a 97 13 22 99 a8 5f d1 ef a9 be d2 |F......".._.....|
peer0.org1.example.com | 00000010 c2 a4 4d 77 ef 8d d0 74 60 7e 47 fe a8 2f 01 89 |..Mw...t`~G../..|"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp.identity] Verify -> DEBU 35fb Verify: sig = 00000000 30 44 02 20 67 f3 86 7e 34 5e 52 aa 09 3e 66 2b |0D. g..~4^R..>f+|
peer0.org1.example.com | 00000010 72 6c 2b 60 72 fd fe 6d 80 e5 9a fb dd 86 ad c4 |rl+`r..m........|
peer0.org1.example.com | 00000020 ab 24 6e 44 02 20 48 9a d6 96 cf 20 2b 9d 24 72 |.$nD. H.... +.$r|
peer0.org1.example.com | 00000030 d8 ee 7f 3f 5f 99 d4 ef 7d 4f d9 78 77 0b cb 04 |...?_...}O.xw...|
peer0.org1.example.com | 00000040 79 e6 a8 d4 e3 03 |y.....|"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] isSentByMe -> DEBU 35fd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fe Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ff Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3600 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3601 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3602 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3603 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3604 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3605 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3606 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3607 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3608 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 3609 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func1 -> DEBU 360c 0xc0044a92d0 gate 1556789284465124200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360d 0xc0044a92d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360e 0xc0044a92d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360f 0xc0044a92d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3610 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|"
peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3611 Verify: sig = 00000000 30 45 02 21 00 ef 71 9d 80 d2 c7 f7 33 64 7b 79 |0E.!..q.....3d{y|
peer0.org1.example.com | 00000010 6f e0 41 b0 94 29 eb 66 f5 6a 79 70 6d 25 4d 04 |o.A..).f.jypm%M.|
peer0.org1.example.com | 00000020 75 99 52 26 9a 02 20 13 cb 56 a3 7e fc c6 1f c2 |u.R&.. ..V.~....|
peer0.org1.example.com | 00000030 e3 a6 62 4a 4a d2 60 65 fa 3e d6 da 86 dd 6c 5c |..bJJ.`e.>....l\|
peer0.org1.example.com | 00000040 73 b2 7b 29 c6 79 02 |s.{).y.|"
peer0.org1.example.com | "2019-05-02 09:28:04.474 UTC [grpc] HandleSubConnStateChange -> DEBU 3612 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, READY"
peer0.org1.example.com | "2019-05-02 09:28:04.473 UTC [cauthdsl] func2 -> DEBU 3613 0xc0044a92d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.477 UTC [msp.identity] Sign -> DEBU 3614 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 "
peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [msp.identity] Sign -> DEBU 3615 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE "
peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3616 Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.479 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3617 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3618 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|"
peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 44 02 20 34 6a de 18 86 d6 cf 36 41 ca 8e d9 |0D. 4j.....6A...|
peer0.org1.example.com | 00000010 95 ad 74 02 22 19 2d 56 87 a0 72 d2 eb 57 a9 9c |..t.".-V..r..W..|
peer0.org1.example.com | 00000020 88 84 30 71 02 20 70 e0 0f 48 34 44 e2 71 09 b7 |..0q. p..H4D.q..|
peer0.org1.example.com | 00000030 8f e1 db 9b 10 af 37 84 d1 3a 21 16 a1 02 c9 68 |......7..:!....h|
peer0.org1.example.com | 00000040 13 a8 63 31 f9 6c |..c1.l|"
peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] authenticateRemotePeer -> DEBU 361a Authenticated 172.18.0.6:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] createConnection -> DEBU 361b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] sendToEndpoint -> DEBU 361c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [cauthdsl] func1 -> DEBU 361d 0xc0044a92d0 gate 1556789284465124200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [grpc] infof -> DEBU 361e transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 361f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 3620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3621 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3622 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3623 Authenticated 172.18.0.5:7051"
peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] createConnection -> DEBU 3624 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] sendToEndpoint -> DEBU 3625 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.508 UTC [gossip.comm] func1 -> DEBU 3626 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.508 UTC [gossip.gossip] handleMessage -> DEBU 3627 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3628 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3629 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.510 UTC [gossip.gossip] handleMessage -> DEBU 362a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.517 UTC [gossip.comm] func1 -> DEBU 362b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.518 UTC [gossip.gossip] handleMessage -> DEBU 362c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.518 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:04.519 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:04.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 362f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.520 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3630 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.520 UTC [policies] Evaluate -> DEBU 3631 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3632 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [gossip.comm] func1 -> DEBU 3633 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3634 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.522 UTC [msp] DeserializeIdentity -> DEBU 3635 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.522 UTC [msp.identity] newIdentity -> DEBU 3636 Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:04.523 UTC [cauthdsl] func1 -> DEBU 3637 0xc00244d0d0 gate 1556789284523506100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.523 UTC [cauthdsl] func2 -> DEBU 3638 0xc00244d0d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 3639 0xc00244d0d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363a 0xc00244d0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363b 0xc00244d0d0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func1 -> DEBU 363c 0xc00244d0d0 gate 1556789284523506100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.527 UTC [policies] Evaluate -> DEBU 363f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.527 UTC [cauthdsl] func1 -> DEBU 3640 0xc002e8a250 gate 1556789284527722500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3641 0xc002e8a250 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3642 0xc002e8a250 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3643 0xc002e8a250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3644 0xc002e8a250 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func1 -> DEBU 3645 0xc002e8a250 gate 1556789284527722500 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3646 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3647 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.530 UTC [policies] Evaluate -> DEBU 3648 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func1 -> DEBU 3649 0xc002e8aab0 gate 1556789284534150800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364a 0xc002e8aab0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364b 0xc002e8aab0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364c Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:04.535 UTC [msp] Validate -> DEBU 364d MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:04.535 UTC [msp] getCertificationChain -> DEBU 364e MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [cauthdsl] func2 -> DEBU 364f 0xc002e8aab0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3650 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3651 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [cauthdsl] func2 -> DEBU 3652 0xc002e8aab0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [cauthdsl] func1 -> DEBU 3653 0xc002e8aab0 gate 1556789284534150800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [policies] Evaluate -> DEBU 3654 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3656 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3657 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3658 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3659 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.540 UTC [msp.identity] Verify -> DEBU 365a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:04.543 UTC [msp.identity] Verify -> DEBU 365c Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:04.542 UTC [msp] DeserializeIdentity -> DEBU 365b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.543 UTC [msp] DeserializeIdentity -> DEBU 365d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [msp] DeserializeIdentity -> DEBU 365e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [gossip.gossip] handleMessage -> DEBU 365f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [gossip.comm] Send -> DEBU 3660 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers"
peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3661 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3662 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3663 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3664 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3665 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3666 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.570 UTC [gossip.comm] func1 -> DEBU 3667 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17778819370933428989 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.571 UTC [gossip.gossip] handleMessage -> DEBU 3668 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17778819370933428989 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.571 UTC [gossip.pull] HandleMessage -> DEBU 3669 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17778819370933428989 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.572 UTC [gossip.pull] SendDigest -> DEBU 366a Sending BLOCK_MSG digest: [9 1 2 3 4 5 6 7 8] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:04.572 UTC [gossip.gossip] handleMessage -> DEBU 366b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.752 UTC [gossip.comm] func1 -> DEBU 366c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.752 UTC [gossip.gossip] handleMessage -> DEBU 366d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 3670 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.756 UTC [gossip.gossip] handleMessage -> DEBU 3671 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.758 UTC [gossip.comm] func1 -> DEBU 3672 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.758 UTC [gossip.gossip] handleMessage -> DEBU 3673 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3675 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3676 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3677 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3678 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3679 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 367a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func1 -> DEBU 367b 0xc002fd96c0 gate 1556789284760892500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367c 0xc002fd96c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367d 0xc002fd96c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367e 0xc002fd96c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 367f Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 3680 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [cauthdsl] func2 -> DEBU 3681 0xc002fd96c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [cauthdsl] func1 -> DEBU 3682 0xc002fd96c0 gate 1556789284760892500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3683 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3684 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3685 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3686 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [msp] DeserializeIdentity -> DEBU 3687 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.765 UTC [gossip.comm] func1 -> DEBU 3688 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 3689 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 368a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.771 UTC [msp] DeserializeIdentity -> DEBU 368b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 368c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368d Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368e Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 368f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3690 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3691 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func1 -> DEBU 3692 0xc0035f10d0 gate 1556789284774089100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3693 0xc0035f10d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3694 0xc0035f10d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.775 UTC [cauthdsl] func2 -> DEBU 3695 0xc0035f10d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.775 UTC [msp.identity] Verify -> DEBU 3696 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [msp.identity] Verify -> DEBU 3697 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [cauthdsl] func2 -> DEBU 3698 0xc0035f10d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [cauthdsl] func1 -> DEBU 3699 0xc0035f10d0 gate 1556789284774089100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.778 UTC [msp] DeserializeIdentity -> DEBU 369e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.778 UTC [gossip.gossip] handleMessage -> DEBU 369f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.980 UTC [gossip.comm] func1 -> DEBU 36a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.981 UTC [gossip.gossip] handleMessage -> DEBU 36a1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.983 UTC [gossip.gossip] handleMessage -> DEBU 36a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:04.990 UTC [gossip.comm] func1 -> DEBU 36a6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.990 UTC [gossip.gossip] handleMessage -> DEBU 36a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:04.991 UTC [msp] DeserializeIdentity -> DEBU 36a8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36aa Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ab Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [policies] Evaluate -> DEBU 36ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [cauthdsl] func1 -> DEBU 36af 0xc003e6b320 gate 1556789284993571600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [cauthdsl] func2 -> DEBU 36b0 0xc003e6b320 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b1 0xc003e6b320 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b2 0xc003e6b320 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [cauthdsl] func2 -> DEBU 36b5 0xc003e6b320 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [cauthdsl] func1 -> DEBU 36b6 0xc003e6b320 gate 1556789284993571600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36b9 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:04.998 UTC [gossip.gossip] handleMessage -> DEBU 36bc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36bd Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151028 "
peer0.org1.example.com | "2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36be Sign: digest: 80087D267E5F5F113D94F3674E6B1C812887033DC10ABD3A76F6DB510C95C6D4 "
peer0.org1.example.com | "2019-05-02 09:28:05.608 UTC [msp.identity] Sign -> DEBU 36bf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:05.609 UTC [msp.identity] Sign -> DEBU 36c0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:05.610 UTC [gossip.comm] Send -> DEBU 36c1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.610 UTC [msp] DeserializeIdentity -> DEBU 36c2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] Send -> DEBU 36c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [msp] DeserializeIdentity -> DEBU 36c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [gossip.comm] sendToEndpoint -> DEBU 36c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36c9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [gossip.comm] Send -> DEBU 36c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36cb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.comm] func1 -> DEBU 36cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36cd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36ce Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36d0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d1 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..|
peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d2 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..|
peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......|
peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....|
peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.|
peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] isSentByMe -> DEBU 36d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.comm] func1 -> DEBU 36d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36db Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dc Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..|
peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dd Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..|
peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......|
peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....|
peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.|
peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] isSentByMe -> DEBU 36df Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36e0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.comm] func1 -> DEBU 36e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36e6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e7 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..|
peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e8 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..|
peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......|
peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....|
peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.|
peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36ea Verify: sig = 00000000 30 44 02 20 32 68 4e c8 56 1b 5b 8e 54 b7 b0 d7 |0D. 2hN.V.[.T...|
peer0.org1.example.com | 00000010 d6 5e e7 9d f9 98 40 b9 78 26 cf 74 56 ee 48 7c |.^....@.x&.tV.H||
peer0.org1.example.com | 00000020 80 c7 20 86 02 20 04 89 58 5b d8 38 9f 55 15 2a |.. .. ..X[.8.U.*|
peer0.org1.example.com | 00000030 e3 3a f4 c8 64 d9 0f 36 d4 95 f2 4d 2e da aa af |.:..d..6...M....|
peer0.org1.example.com | 00000040 33 ce a6 b0 d1 58 |3....X|"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] isSentByMe -> DEBU 36ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36ed Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36ee Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.comm] func1 -> DEBU 36ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36f3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [msp] DeserializeIdentity -> DEBU 36f4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [cauthdsl] func1 -> DEBU 36fb 0xc00419fb80 gate 1556789285625972700 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fc 0xc00419fb80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fd 0xc00419fb80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fe 0xc00419fb80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 36ff Verify: digest = 00000000 fa a0 9b 03 9a 54 97 2d fe f5 21 b0 77 43 11 c7 |.....T.-..!.wC..|
peer0.org1.example.com | 00000010 44 07 9a e5 b2 10 76 1f f8 aa 56 f7 2f 0c 3e 8f |D.....v...V./.>.|"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 3700 Verify: sig = 00000000 30 44 02 20 17 10 ee 8b 8d 75 a8 d5 1b 2c db 8e |0D. .....u...,..|
peer0.org1.example.com | 00000010 45 30 5f 20 3e 71 ab 67 39 41 b2 51 d8 3a 76 43 |E0_ >q.g9A.Q.:vC|
peer0.org1.example.com | 00000020 ec ee 89 c0 02 20 4c 3a 8c de e0 e3 09 b4 96 47 |..... L:.......G|
peer0.org1.example.com | 00000030 8e 79 84 af 16 31 04 93 51 d1 7f 32 a0 13 75 13 |.y...1..Q..2..u.|
peer0.org1.example.com | 00000040 c7 82 92 b0 63 2b |....c+|"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 3701 0xc00419fb80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func1 -> DEBU 3702 0xc00419fb80 gate 1556789285625972700 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3703 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3704 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3705 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 3707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3708 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3709 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 "
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 "
peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] learnExistingMembers -> DEBU 370c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 370d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 370e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 370f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3710 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3711 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3712 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] Send -> DEBU 3713 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 3714 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3715 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3716 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.comm] func1 -> DEBU 3717 Got message: GossipMessage: tag:EMPTY hello:<nonce:10896204851302048333 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.gossip] handleMessage -> DEBU 3718 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:10896204851302048333 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.pull] HandleMessage -> DEBU 3719 GossipMessage: tag:EMPTY hello:<nonce:10896204851302048333 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [gossip.pull] SendDigest -> DEBU 3720 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [gossip.gossip] handleMessage -> DEBU 3721 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.comm] func1 -> DEBU 3722 Got message: GossipMessage: tag:EMPTY hello:<nonce:1114603201518276193 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.gossip] handleMessage -> DEBU 3723 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:1114603201518276193 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.pull] HandleMessage -> DEBU 3724 GossipMessage: tag:EMPTY hello:<nonce:1114603201518276193 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3725 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3726 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3727 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3728 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3729 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 372a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [gossip.pull] SendDigest -> DEBU 372b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [gossip.gossip] handleMessage -> DEBU 372c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372d Got message: GossipMessage: tag:EMPTY hello:<nonce:14598918737913132760 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.gossip] handleMessage -> DEBU 372f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:14598918737913132760 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.pull] HandleMessage -> DEBU 3730 GossipMessage: tag:EMPTY hello:<nonce:14598918737913132760 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.pull] SendDigest -> DEBU 3731 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3732 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3733 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.gossip] handleMessage -> DEBU 3734 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3735 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3736 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3737 Verify: digest = 00000000 a8 ad bf 04 eb 1e c7 38 ac ef 02 9a 41 6a de 26 |.......8....Aj.&|
peer0.org1.example.com | 00000010 29 03 06 7d ce 8c c2 77 62 56 bf 86 d9 7d b5 54 |)..}...wbV...}.T|"
peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3738 Verify: sig = 00000000 30 44 02 20 30 f4 a0 c3 85 70 46 b3 8d 41 09 f1 |0D. 0....pF..A..|
peer0.org1.example.com | 00000010 55 d3 bb 5a 38 4a fb d6 24 bf 1a 2e c4 31 90 3b |U..Z8J..$....1.;|
peer0.org1.example.com | 00000020 73 ff 1f d1 02 20 43 fd 52 05 89 00 4a 35 66 2a |s.... C.R...J5f*|
peer0.org1.example.com | 00000030 9a 74 8c 53 ab 7d 14 ee 33 aa 22 03 09 35 c7 5f |.t.S.}..3."..5._|
peer0.org1.example.com | 00000040 9f 34 49 b8 2d d8 |.4I.-.|"
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 3739 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 373a Verify: sig = 00000000 30 45 02 21 00 af 59 0a ed 19 99 7f 10 71 0a 09 |0E.!..Y......q..|
peer0.org1.example.com | 00000010 ef e0 78 a0 ab 3c 4a 5c 35 00 62 cc 0b e3 8f dc |..x..<J\5.b.....|
peer0.org1.example.com | 00000020 83 31 d9 82 2d 02 20 3a 6e 72 f4 fb 54 0a df 3f |.1..-. :nr..T..?|
peer0.org1.example.com | 00000030 d0 98 5b 65 81 d8 44 ba a8 f2 8f 33 a8 29 da 42 |..[e..D....3.).B|
peer0.org1.example.com | 00000040 39 11 95 44 24 c6 0c |9..D$..|"
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] handleAliveMessage -> DEBU 373b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 3740 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 3741 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3742 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] sendMemResponse -> DEBU 3743 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3744 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.comm] Send -> DEBU 3746 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.discovery] sendMemResponse -> DEBU 3747 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.694 UTC [gossip.comm] func1 -> DEBU 374a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.697 UTC [gossip.gossip] handleMessage -> DEBU 374b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.698 UTC [gossip.gossip] handleMessage -> DEBU 374c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 374e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:05.700 UTC [msp] DeserializeIdentity -> DEBU 374f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3750 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3751 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3752 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [policies] Evaluate -> DEBU 3753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [cauthdsl] func1 -> DEBU 3756 0xc0026291d0 gate 1556789285703406500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3757 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3758 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.pull] Hello -> DEBU 3759 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.comm] Send -> DEBU 375d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11157422678022721553 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.comm] sendToEndpoint -> DEBU 375e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11157422678022721553 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] sendToEndpoint -> DEBU 375f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3760 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3761 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2621721536798222730 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3762 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3763 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16145687940009107059 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3764 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3765 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13684990153607220555 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3766 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13684990153607220555 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3767 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3768 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2621721536798222730 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3769 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16145687940009107059 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [cauthdsl] func2 -> DEBU 375c 0xc0026291d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 376c 0xc0026291d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.comm] func1 -> DEBU 376d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 376e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.pull] HandleMessage -> DEBU 376f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 3770 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.comm] func1 -> DEBU 3771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3772 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.pull] HandleMessage -> DEBU 3773 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3774 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 3775 0xc0026291d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3776 Verify: digest = 00000000 27 b1 36 fb 51 6b 55 ff 98 b2 e5 ab 39 23 4f 33 |'.6.QkU.....9#O3|
peer0.org1.example.com | 00000010 50 92 ad 32 b1 6b e6 ce c5 b3 c9 e6 03 1c c4 e3 |P..2.k..........|"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3777 Verify: sig = 00000000 30 44 02 20 62 76 55 fd 27 ec 91 79 7b f7 78 72 |0D. bvU.'..y{.xr|
peer0.org1.example.com | 00000010 af da ee 51 00 33 4b cc d7 e5 96 1b 74 5e cc 59 |...Q.3K.....t^.Y|
peer0.org1.example.com | 00000020 4d 0a a8 0f 02 20 66 44 86 07 5a be ec 10 21 ca |M.... fD..Z...!.|
peer0.org1.example.com | 00000030 d3 a2 cb eb a1 78 6a 76 5e 81 b9 f3 26 f4 96 b4 |.....xjv^...&...|
peer0.org1.example.com | 00000040 18 8f 2f 93 bd 8c |../...|"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [cauthdsl] func2 -> DEBU 3778 0xc0026291d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [cauthdsl] func1 -> DEBU 3779 0xc0026291d0 gate 1556789285703406500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377a Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377c Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 377e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 377f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3780 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3781 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3782 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3783 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 3784 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3785 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 3786 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3787 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3788 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3789 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.comm] Send -> DEBU 378a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 378b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:05.711 UTC [gossip.comm] sendToEndpoint -> DEBU 378c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.712 UTC [gossip.comm] sendToEndpoint -> DEBU 378d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.gossip] handleMessage -> DEBU 3790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.715 UTC [gossip.pull] HandleMessage -> DEBU 3791 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.715 UTC [gossip.gossip] handleMessage -> DEBU 3792 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.pull] HandleMessage -> DEBU 3794 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3795 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 3796 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] IsLeader -> DEBU 3797 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3798 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100B1801 "
peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3799 Sign: digest: 7F30746E3538A71E84D333B12392F6BDF8AF53624F0CEFB266DE0033E741D1B0 "
peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 379a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [gossip.comm] Send -> DEBU 379f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [gossip.comm] sendToEndpoint -> DEBU 37a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:07.330 UTC [gossip.comm] sendToEndpoint -> DEBU 37a3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] Send -> DEBU 37a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a8 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37aa Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ac Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.250 UTC [gossip.comm] func1 -> DEBU 37ad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.252 UTC [gossip.gossip] handleMessage -> DEBU 37b0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.253 UTC [msp] DeserializeIdentity -> DEBU 37b1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37ae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37af Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.254 UTC [msp] DeserializeIdentity -> DEBU 37b2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [msp] DeserializeIdentity -> DEBU 37b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b5 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b6 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.256 UTC [policies] Evaluate -> DEBU 37b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37ba Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [gossip.comm] Send -> DEBU 37bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37be Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.260 UTC [gossip.comm] sendToEndpoint -> DEBU 37c4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.261 UTC [cauthdsl] func1 -> DEBU 37c5 0xc00328b390 gate 1556789288261762500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c6 0xc00328b390 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c7 0xc00328b390 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.263 UTC [cauthdsl] func2 -> DEBU 37c8 0xc00328b390 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.263 UTC [msp.identity] Verify -> DEBU 37c9 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:08.264 UTC [msp.identity] Verify -> DEBU 37ca Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [cauthdsl] func2 -> DEBU 37cb 0xc00328b390 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [cauthdsl] func1 -> DEBU 37cc 0xc00328b390 gate 1556789288261762500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [policies] Evaluate -> DEBU 37cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37cf Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func1 -> DEBU 37db 0xc0042d3280 gate 1556789288269829900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dc 0xc0042d3280 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dd 0xc0042d3280 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37de 0xc0042d3280 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37df Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37e0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [cauthdsl] func2 -> DEBU 37e1 0xc0042d3280 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [cauthdsl] func1 -> DEBU 37e2 0xc0042d3280 gate 1556789288269829900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.273 UTC [msp.identity] Verify -> DEBU 37e7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:08.274 UTC [msp.identity] Verify -> DEBU 37e8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37e9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [msp] DeserializeIdentity -> DEBU 37eb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.276 UTC [msp] DeserializeIdentity -> DEBU 37ec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.277 UTC [msp] DeserializeIdentity -> DEBU 37ed Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.278 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ef Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f0 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.281 UTC [policies] Evaluate -> DEBU 37f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.283 UTC [cauthdsl] func1 -> DEBU 37f4 0xc0024b94b0 gate 1556789288283540800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.283 UTC [cauthdsl] func2 -> DEBU 37f5 0xc0024b94b0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.284 UTC [cauthdsl] func2 -> DEBU 37f6 0xc0024b94b0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.286 UTC [cauthdsl] func2 -> DEBU 37f7 0xc0024b94b0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.286 UTC [msp.identity] Verify -> DEBU 37f8 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:08.287 UTC [msp.identity] Verify -> DEBU 37f9 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:08.288 UTC [cauthdsl] func2 -> DEBU 37fa 0xc0024b94b0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.289 UTC [cauthdsl] func1 -> DEBU 37fb 0xc0024b94b0 gate 1556789288283540800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37fe Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.294 UTC [msp.identity] Verify -> DEBU 3800 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:08.295 UTC [msp.identity] Verify -> DEBU 3801 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:08.295 UTC [msp] DeserializeIdentity -> DEBU 3802 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.296 UTC [msp] DeserializeIdentity -> DEBU 3803 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3804 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3805 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3806 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3807 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3808 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.299 UTC [policies] Evaluate -> DEBU 3809 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.300 UTC [cauthdsl] func1 -> DEBU 380a 0xc0025013a0 gate 1556789288300251500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.300 UTC [cauthdsl] func2 -> DEBU 380b 0xc0025013a0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.301 UTC [cauthdsl] func2 -> DEBU 380c 0xc0025013a0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.302 UTC [cauthdsl] func2 -> DEBU 380d 0xc0025013a0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.303 UTC [msp.identity] Verify -> DEBU 380e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:08.304 UTC [msp.identity] Verify -> DEBU 380f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:08.305 UTC [cauthdsl] func2 -> DEBU 3810 0xc0025013a0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.306 UTC [cauthdsl] func1 -> DEBU 3811 0xc0025013a0 gate 1556789288300251500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.306 UTC [policies] Evaluate -> DEBU 3812 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3813 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3814 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.308 UTC [policies] Evaluate -> DEBU 3815 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.309 UTC [msp.identity] Verify -> DEBU 3816 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:08.311 UTC [msp.identity] Verify -> DEBU 3817 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:08.313 UTC [gossip.gossip] handleMessage -> DEBU 3818 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.314 UTC [gossip.gossip] handleMessage -> DEBU 3819 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.315 UTC [msp.identity] Verify -> DEBU 381a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:08.316 UTC [msp.identity] Verify -> DEBU 381b Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 381f Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3821 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3822 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3823 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.321 UTC [cauthdsl] func1 -> DEBU 3824 0xc002c65bf0 gate 1556789288321352000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.321 UTC [cauthdsl] func2 -> DEBU 3825 0xc002c65bf0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3826 0xc002c65bf0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3827 0xc002c65bf0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [msp.identity] Verify -> DEBU 3828 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:08.324 UTC [msp.identity] Verify -> DEBU 3829 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:08.325 UTC [cauthdsl] func2 -> DEBU 382a 0xc002c65bf0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.326 UTC [cauthdsl] func1 -> DEBU 382b 0xc002c65bf0 gate 1556789288321352000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382c Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382e Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.328 UTC [policies] Evaluate -> DEBU 382f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3830 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3831 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:08.330 UTC [msp] DeserializeIdentity -> DEBU 3832 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.331 UTC [msp] DeserializeIdentity -> DEBU 3833 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.331 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3834 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3835 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3836 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.334 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.335 UTC [policies] Evaluate -> DEBU 3838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.336 UTC [policies] Evaluate -> DEBU 3839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.336 UTC [cauthdsl] func1 -> DEBU 383a 0xc003077ae0 gate 1556789288336687100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383b 0xc003077ae0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383c 0xc003077ae0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [cauthdsl] func2 -> DEBU 383d 0xc003077ae0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:08.339 UTC [cauthdsl] func2 -> DEBU 3840 0xc003077ae0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [cauthdsl] func1 -> DEBU 3841 0xc003077ae0 gate 1556789288336687100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3844 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3845 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [gossip.gossip] handleMessage -> DEBU 3846 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.504 UTC [gossip.comm] func1 -> DEBU 3847 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.504 UTC [gossip.gossip] handleMessage -> DEBU 3848 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 3849 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 384a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.506 UTC [gossip.gossip] handleMessage -> DEBU 384b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.567 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7191508925078687040 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.567 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7191508925078687040 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.pull] HandleMessage -> DEBU 384e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7191508925078687040 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.pull] SendDigest -> DEBU 384f Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.gossip] handleMessage -> DEBU 3850 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.753 UTC [gossip.comm] func1 -> DEBU 3851 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.754 UTC [gossip.gossip] handleMessage -> DEBU 3852 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [gossip.gossip] handleMessage -> DEBU 3856 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.comm] func1 -> DEBU 3857 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3858 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3859 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 385b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 385d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385e Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385f Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3860 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3861 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [policies] Evaluate -> DEBU 3862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func1 -> DEBU 3863 0xc003f098d0 gate 1556789288809414900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3864 0xc003f098d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3865 0xc003f098d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3866 0xc003f098d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3867 Verify: digest = 00000000 a1 75 1b 11 26 e1 38 06 9a 6f a3 62 38 56 57 94 |.u..&.8..o.b8VW.|
peer0.org1.example.com | 00000010 0b ca 59 e6 19 28 49 fe 27 9b 1a c6 4d 33 7d f9 |..Y..(I.'...M3}.|"
peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3868 Verify: sig = 00000000 30 45 02 21 00 f2 11 27 85 de f2 2b 3d 77 4e c9 |0E.!...'...+=wN.|
peer0.org1.example.com | 00000010 b3 da 02 e6 b2 05 10 e4 fa a3 77 5e 17 40 ab 14 |..........w^.@..|
peer0.org1.example.com | 00000020 6e e0 f4 64 35 02 20 46 16 b5 c7 ea 1a 54 7b 38 |n..d5. F.....T{8|
peer0.org1.example.com | 00000030 37 92 21 c3 42 94 76 aa fe 15 43 5c b1 8f 45 a9 |7.!.B.v...C\..E.|
peer0.org1.example.com | 00000040 47 dd 46 72 eb 70 57 |G.Fr.pW|"
peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [cauthdsl] func2 -> DEBU 3869 0xc003f098d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [cauthdsl] func1 -> DEBU 386a 0xc003f098d0 gate 1556789288809414900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386b Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386d Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [gossip.discovery] handleAliveMessage -> DEBU 386f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3870 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3871 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3872 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3873 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3874 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] handleAliveMessage -> DEBU 3875 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.813 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3876 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3877 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.gossip] handleMessage -> DEBU 3879 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [gossip.gossip] handleMessage -> DEBU 387a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3878 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 387f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [gossip.gossip] handleMessage -> DEBU 387d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.gossip] handleMessage -> DEBU 3881 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 3880 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3882 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3883 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3884 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3885 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3886 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [msp] DeserializeIdentity -> DEBU 3887 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [gossip.comm] Send -> DEBU 3888 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [gossip.comm] sendToEndpoint -> DEBU 3889 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [gossip.comm] sendToEndpoint -> DEBU 388a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [msp] DeserializeIdentity -> DEBU 388b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [gossip.comm] Send -> DEBU 388c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:08.824 UTC [gossip.comm] sendToEndpoint -> DEBU 388d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.825 UTC [gossip.comm] sendToEndpoint -> DEBU 388e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [gossip.comm] func1 -> DEBU 388f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [gossip.gossip] handleMessage -> DEBU 3890 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.982 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:08.982 UTC [gossip.gossip] handleMessage -> DEBU 3894 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3895 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151029 "
peer0.org1.example.com | "2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3896 Sign: digest: 73B8DC8ED20B5D216C16DA8D0769521CD788ED38DA01E5477397329AE90110EF "
peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3897 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3898 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3899 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] Send -> DEBU 38a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] sendToEndpoint -> DEBU 38a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.comm] func1 -> DEBU 38a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38ab Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ac Verify: digest = 00000000 34 1f 66 70 48 e7 de d8 4a 0e f1 8d 7f 75 4d 83 |4.fpH...J....uM.|
peer0.org1.example.com | 00000010 a6 16 25 4e 7b a6 bf 83 e4 98 ca 88 c8 4c f3 f0 |..%N{........L..|"
peer0.org1.example.com | "2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ad Verify: sig = 00000000 30 45 02 21 00 b1 e3 f6 11 c6 94 b5 1b 98 9c b6 |0E.!............|
peer0.org1.example.com | 00000010 0d 2a 6c d4 7c 98 a6 0e e9 f5 8e fb f6 39 4d 36 |.*l.|........9M6|
peer0.org1.example.com | 00000020 82 10 9a 90 0f 02 20 18 af e8 d6 1a f8 b9 bb 88 |...... .........|
peer0.org1.example.com | 00000030 43 19 ab 8f df 9e 28 d2 cd 45 bd f9 b2 56 0f a2 |C.....(..E...V..|
peer0.org1.example.com | 00000040 bb b3 af 5c 1a 18 24 |...\..$|"
peer0.org1.example.com | "2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38ae Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38af Verify: sig = 00000000 30 45 02 21 00 a2 ce b0 77 99 5a e2 eb 9b 95 d2 |0E.!....w.Z.....|
peer0.org1.example.com | 00000010 84 7e ea 01 6e 1f 91 d9 7a b0 ee 91 c0 e7 85 c1 |.~..n...z.......|
peer0.org1.example.com | 00000020 63 da 25 bf 20 02 20 48 e3 cc e5 c9 c2 59 b7 c2 |c.%. . H.....Y..|
peer0.org1.example.com | 00000030 1b ea 17 7d 87 cd 37 2a 94 4b 9a 84 98 30 59 e8 |...}..7*.K...0Y.|
peer0.org1.example.com | 00000040 75 d5 77 d0 a3 6a aa |u.w..j.|"
peer0.org1.example.com | "2019-05-02 09:28:09.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.comm] func1 -> DEBU 38b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b8 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38b9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.109 UTC [gossip.comm] func1 -> DEBU 38bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.109 UTC [gossip.gossip] handleMessage -> DEBU 38bc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38be Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bf Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.118 UTC [msp] DeserializeIdentity -> DEBU 38c2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.119 UTC [msp] DeserializeIdentity -> DEBU 38c3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [gossip.comm] Send -> DEBU 38c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] Send -> DEBU 38c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.122 UTC [gossip.comm] sendToEndpoint -> DEBU 38cb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.172 UTC [gossip.comm] func1 -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.172 UTC [gossip.gossip] handleMessage -> DEBU 38cd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.173 UTC [gossip.gossip] handleMessage -> DEBU 38ce Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.175 UTC [msp] DeserializeIdentity -> DEBU 38d1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d3 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d4 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.177 UTC [policies] Evaluate -> DEBU 38d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.178 UTC [policies] Evaluate -> DEBU 38d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:09.180 UTC [policies] Evaluate -> DEBU 38d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.181 UTC [cauthdsl] func1 -> DEBU 38d8 0xc003d68920 gate 1556789289181739600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:09.182 UTC [cauthdsl] func2 -> DEBU 38d9 0xc003d68920 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:09.183 UTC [cauthdsl] func2 -> DEBU 38da 0xc003d68920 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:09.184 UTC [cauthdsl] func2 -> DEBU 38db 0xc003d68920 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.184 UTC [msp.identity] Verify -> DEBU 38dc Verify: digest = 00000000 37 ad 16 38 c1 22 77 1c 31 b6 4d 36 93 80 be 04 |7..8."w.1.M6....|
peer0.org1.example.com | 00000010 1b a3 b8 ff 3f 87 e7 a4 36 65 7d d5 d1 ef c6 5b |....?...6e}....[|"
peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [gossip.comm] func1 -> DEBU 38dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [gossip.gossip] handleMessage -> DEBU 38df Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [msp.identity] Verify -> DEBU 38de Verify: sig = 00000000 30 44 02 20 7b f6 8a 22 29 b4 de dd 48 05 b6 5f |0D. {..")...H.._|
peer0.org1.example.com | 00000010 e1 1f 1e 44 4c 4e 66 98 84 f9 a5 09 79 1c 40 9c |...DLNf.....y.@.|
peer0.org1.example.com | 00000020 af c6 0c a3 02 20 30 6f f4 a5 f8 04 dd a0 c4 3c |..... 0o.......<|
peer0.org1.example.com | 00000030 bc aa e7 0e 53 dc 1c 7d 24 f1 29 ea 83 ef c4 25 |....S..}$.)....%|
peer0.org1.example.com | 00000040 9c ee 1a 0b dd a5 |......|"
peer0.org1.example.com | "2019-05-02 09:28:09.188 UTC [cauthdsl] func2 -> DEBU 38e0 0xc003d68920 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.188 UTC [cauthdsl] func1 -> DEBU 38e1 0xc003d68920 gate 1556789289181739600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.comm] func1 -> DEBU 38e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.190 UTC [policies] Evaluate -> DEBU 38e4 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [policies] Evaluate -> DEBU 38e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 "
peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ea Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 "
peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38eb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ec Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ed Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ee Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38ef Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.197 UTC [msp] DeserializeIdentity -> DEBU 38f5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.201 UTC [msp] DeserializeIdentity -> DEBU 38f6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.206 UTC [msp] DeserializeIdentity -> DEBU 38f7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.207 UTC [msp] DeserializeIdentity -> DEBU 38f8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.208 UTC [msp] DeserializeIdentity -> DEBU 38f9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.209 UTC [msp] DeserializeIdentity -> DEBU 38fb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [gossip.comm] Send -> DEBU 38fc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38fd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38fa Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [gossip.comm] sendToEndpoint -> DEBU 38fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.211 UTC [gossip.comm] sendToEndpoint -> DEBU 3900 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38ff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] Send -> DEBU 3901 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3902 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3903 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.613 UTC [msp.identity] Sign -> DEBU 3904 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102A "
peer0.org1.example.com | "2019-05-02 09:28:09.614 UTC [msp.identity] Sign -> DEBU 3905 Sign: digest: F7DE0249F4584EFE2D0BC0F49C32E173DBC309588E5D22168386C156B5A2A574 "
peer0.org1.example.com | "2019-05-02 09:28:09.615 UTC [msp.identity] Sign -> DEBU 3906 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:09.616 UTC [msp.identity] Sign -> DEBU 3907 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:09.619 UTC [gossip.comm] Send -> DEBU 3908 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.619 UTC [msp] DeserializeIdentity -> DEBU 3909 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.620 UTC [gossip.comm] Send -> DEBU 390a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.621 UTC [msp] DeserializeIdentity -> DEBU 390b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.622 UTC [gossip.comm] Send -> DEBU 390c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.633 UTC [gossip.comm] sendToEndpoint -> DEBU 3910 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3911 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3912 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.637 UTC [gossip.comm] func1 -> DEBU 3913 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.638 UTC [gossip.comm] func1 -> DEBU 3914 Got message: GossipMessage: tag:EMPTY hello:<nonce:10235172559831169868 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3915 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3916 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.641 UTC [gossip.gossip] handleMessage -> DEBU 3917 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:10235172559831169868 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.642 UTC [gossip.comm] func1 -> DEBU 3918 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [gossip.comm] func1 -> DEBU 391c Got message: GossipMessage: tag:EMPTY hello:<nonce:6868649503426123562 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3919 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 391d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [msp] DeserializeIdentity -> DEBU 391e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 391f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3920 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3921 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3922 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3923 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [policies] Evaluate -> DEBU 3924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func1 -> DEBU 3925 0xc002534e10 gate 1556789289661227400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3926 0xc002534e10 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3927 0xc002534e10 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3928 0xc002534e10 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [msp.identity] Verify -> DEBU 3929 Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL|
peer0.org1.example.com | 00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq<J`$W...|"
peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [msp.identity] Verify -> DEBU 392a Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......|
peer0.org1.example.com | 00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG|
peer0.org1.example.com | 00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.|
peer0.org1.example.com | 00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB|
peer0.org1.example.com | 00000040 42 bb c7 8b 68 9e |B...h.|"
peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [cauthdsl] func2 -> DEBU 392b 0xc002534e10 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [cauthdsl] func1 -> DEBU 392c 0xc002534e10 gate 1556789289661227400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 392f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 3930 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] handleAliveMessage -> DEBU 3931 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3933 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 "
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3934 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 "
peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3935 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 3936 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 3937 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3938 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 3939 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] Send -> DEBU 393d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 393e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 3940 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.671 UTC [gossip.comm] func1 -> DEBU 3941 Got message: GossipMessage: tag:EMPTY hello:<nonce:8840334909784993820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.676 UTC [gossip.pull] HandleMessage -> DEBU 3942 GossipMessage: tag:EMPTY hello:<nonce:10235172559831169868 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3943 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3944 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3945 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3946 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3947 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3948 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [gossip.pull] SendDigest -> DEBU 3949 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.gossip] handleMessage -> DEBU 394e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 394f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3950 Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s|
peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|"
peer0.org1.example.com | "2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3951 Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.|
peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f|
peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....|
peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.|
peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|"
peer0.org1.example.com | "2019-05-02 09:28:09.696 UTC [msp.identity] Verify -> DEBU 3952 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:09.698 UTC [msp.identity] Verify -> DEBU 3953 Verify: sig = 00000000 30 44 02 20 1c f6 13 da 70 99 f0 f8 0e 5c 10 7f |0D. ....p....\..|
peer0.org1.example.com | 00000010 ad 79 d7 ca 85 4a 32 2b e2 11 ab 6b 54 05 7e bc |.y...J2+...kT.~.|
peer0.org1.example.com | 00000020 27 b9 1a dc 02 20 71 ee 61 49 c3 e9 53 b5 b0 c2 |'.... q.aI..S...|
peer0.org1.example.com | 00000030 00 55 bb a9 12 39 4c d4 dd 04 e8 0e 95 5e 23 01 |.U...9L......^#.|
peer0.org1.example.com | 00000040 74 5d d8 6a 52 4d |t].jRM|"
peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] isSentByMe -> DEBU 3955 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3956 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3957 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3958 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 3959 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 395a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.701 UTC [msp.identity] Verify -> DEBU 395c Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s|
peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|"
peer0.org1.example.com | "2019-05-02 09:28:09.703 UTC [msp.identity] Verify -> DEBU 395d Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.|
peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f|
peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....|
peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.|
peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|"
peer0.org1.example.com | "2019-05-02 09:28:09.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 395e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.706 UTC [gossip.discovery] isSentByMe -> DEBU 395f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 3960 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3962 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3963 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.comm] func1 -> DEBU 3961 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.709 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3964 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3968 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 396a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.gossip] handleMessage -> DEBU 3969 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.gossip] handleMessage -> DEBU 396c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:6868649503426123562 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.pull] Hello -> DEBU 3966 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.comm] Send -> DEBU 396d Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4841735105627059395 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.pull] HandleMessage -> DEBU 396e GossipMessage: tag:EMPTY hello:<nonce:6868649503426123562 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3972 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3974 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3975 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [msp] DeserializeIdentity -> DEBU 3976 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [gossip.pull] SendDigest -> DEBU 3977 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [gossip.gossip] handleMessage -> DEBU 3978 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.gossip] handleMessage -> DEBU 3979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:8840334909784993820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.pull] HandleMessage -> DEBU 397a GossipMessage: tag:EMPTY hello:<nonce:8840334909784993820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3973 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4841735105627059395 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.pull] SendDigest -> DEBU 397b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.pull] Hello -> DEBU 3970 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 397e Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1355778949748241885 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.pull] Hello -> DEBU 397f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 3981 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2948271416903558199 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2948271416903558199 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3984 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.comm] sendToEndpoint -> DEBU 3980 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 396b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3985 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.comm] func1 -> DEBU 3967 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.721 UTC [policies] Evaluate -> DEBU 3986 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3987 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func1 -> DEBU 3989 0xc00352e360 gate 1556789289723314300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398a 0xc00352e360 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398b 0xc00352e360 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [cauthdsl] func2 -> DEBU 398c 0xc00352e360 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [msp.identity] Verify -> DEBU 398d Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL|
peer0.org1.example.com | 00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq<J`$W...|"
peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [msp.identity] Verify -> DEBU 398f Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......|
peer0.org1.example.com | 00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG|
peer0.org1.example.com | 00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.|
peer0.org1.example.com | 00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB|
peer0.org1.example.com | 00000040 42 bb c7 8b 68 9e |B...h.|"
peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [cauthdsl] func2 -> DEBU 3990 0xc00352e360 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [cauthdsl] func1 -> DEBU 3991 0xc00352e360 gate 1556789289723314300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [policies] Evaluate -> DEBU 3992 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3994 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3995 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 3997 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3998 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3999 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399a Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s|
peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|"
peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399b Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.|
peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f|
peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....|
peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.|
peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|"
peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] isSentByMe -> DEBU 399d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 399f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a2 Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.|
peer0.org1.example.com | 00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|"
peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a3 Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.|
peer0.org1.example.com | 00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......|
peer0.org1.example.com | 00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1<u.2|
peer0.org1.example.com | 00000030 93 f6 fa 8d ab 1e cf 7a a1 1e e0 1d 0a 0a aa 07 |.......z........|
peer0.org1.example.com | 00000040 8d fb 9d 64 cb 4e |...d.N|"
peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:09.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3982 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1355778949748241885 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [gossip.pull] Hello -> DEBU 3993 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [msp.identity] Verify -> DEBU 39a5 Verify: sig = 00000000 30 44 02 20 22 e2 72 2e 41 92 eb 36 a3 fd 12 0d |0D. ".r.A..6....|
peer0.org1.example.com | 00000010 68 c2 81 db 04 cb e9 3f c9 e5 37 c0 c6 4b 85 8c |h......?..7..K..|
peer0.org1.example.com | 00000020 8a 1b 7e b9 02 20 60 48 8b 66 6d 05 36 92 aa 40 |..~.. `H.fm.6..@|
peer0.org1.example.com | 00000030 72 42 a7 f7 05 80 17 3e 8d 3e 1a 82 d4 95 50 dd |rB.....>.>....P.|
peer0.org1.example.com | 00000040 2b 0f 76 01 e8 45 |+.v..E|"
peer0.org1.example.com | "2019-05-02 09:28:09.732 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ab updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ae Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 39af Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39b0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [gossip.discovery] sendMemResponse -> DEBU 39b1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.comm] Send -> DEBU 39b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.discovery] sendMemResponse -> DEBU 39b5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.comm] sendToEndpoint -> DEBU 39b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU 39b7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.737 UTC [gossip.comm] func1 -> DEBU 39b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [gossip.comm] sendToEndpoint -> DEBU 39a7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.732 UTC [msp] DeserializeIdentity -> DEBU 39a8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.742 UTC [msp] DeserializeIdentity -> DEBU 39bb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [gossip.gossip] handleMessage -> DEBU 39a6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.741 UTC [gossip.comm] func1 -> DEBU 39b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.742 UTC [gossip.comm] func1 -> DEBU 39ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.743 UTC [gossip.comm] Send -> DEBU 39bc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1437820415744880594 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bf Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c1 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.pull] HandleMessage -> DEBU 39c2 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.pull] HandleMessage -> DEBU 39c5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.pull] HandleMessage -> DEBU 39c8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.gossip] handleMessage -> DEBU 39c9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.comm] sendToEndpoint -> DEBU 39be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1437820415744880594 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.comm] sendToEndpoint -> DEBU 39ca Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.749 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39cb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:09.749 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39cd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ce Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39cf Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func1 -> DEBU 39d3 0xc0043edbd0 gate 1556789289752181000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d4 0xc0043edbd0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d5 0xc0043edbd0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d6 0xc0043edbd0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d7 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...|
peer0.org1.example.com | 00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|"
peer0.org1.example.com | "2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d8 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9|
peer0.org1.example.com | 00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.|
peer0.org1.example.com | 00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.|
peer0.org1.example.com | 00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .|
peer0.org1.example.com | 00000040 b5 b7 7f 38 7e 61 1c |...8~a.|"
peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [cauthdsl] func2 -> DEBU 39d9 0xc0043edbd0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [cauthdsl] func1 -> DEBU 39da 0xc0043edbd0 gate 1556789289752181000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [policies] Evaluate -> DEBU 39db Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dd Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] handleAliveMessage -> DEBU 39df Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:09.757 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] handleAliveMessage -> DEBU 39e5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39e6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.760 UTC [gossip.discovery] sendMemResponse -> DEBU 39e7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:09.760 UTC [msp] DeserializeIdentity -> DEBU 39e8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.761 UTC [msp] DeserializeIdentity -> DEBU 39e9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [msp] DeserializeIdentity -> DEBU 39ea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [gossip.comm] Send -> DEBU 39eb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [gossip.discovery] sendMemResponse -> DEBU 39ec Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ee Exiting"
peer0.org1.example.com | "2019-05-02 09:28:09.768 UTC [gossip.comm] func1 -> DEBU 39ef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.768 UTC [gossip.gossip] handleMessage -> DEBU 39f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.769 UTC [gossip.pull] HandleMessage -> DEBU 39f1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:09.770 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [gossip.comm] Send -> DEBU 39f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [gossip.comm] sendToEndpoint -> DEBU 39f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [gossip.comm] func1 -> DEBU 39fc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [gossip.gossip] handleMessage -> DEBU 39fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39fe Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39ff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [msp] DeserializeIdentity -> DEBU 3a00 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a02 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a03 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func1 -> DEBU 3a07 0xc003617040 gate 1556789292253253000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a08 0xc003617040 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a09 0xc003617040 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc003617040 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0b Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0c Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [cauthdsl] func2 -> DEBU 3a0f 0xc003617040 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [cauthdsl] func1 -> DEBU 3a10 0xc003617040 gate 1556789292253253000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a13 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a15 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a16 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a17 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a18 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.272 UTC [policies] Evaluate -> DEBU 3a1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [cauthdsl] func1 -> DEBU 3a1f 0xc003a76f30 gate 1556789292273744800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003a76f30 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a21 0xc003a76f30 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a22 0xc003a76f30 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.275 UTC [msp.identity] Verify -> DEBU 3a23 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:12.315 UTC [msp.identity] Verify -> DEBU 3a24 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:12.327 UTC [gossip.election] waitForInterrupt -> DEBU 3a25 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.328 UTC [gossip.election] IsLeader -> DEBU 3a26 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:28:12.328 UTC [msp.identity] Sign -> DEBU 3a27 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100C1801 "
peer0.org1.example.com | "2019-05-02 09:28:12.329 UTC [msp.identity] Sign -> DEBU 3a28 Sign: digest: F18829B3F517D100D3F9D0AA3660444C4D35DBEE50C01F3A1E3486C249A526F3 "
peer0.org1.example.com | "2019-05-02 09:28:12.330 UTC [gossip.election] waitForInterrupt -> DEBU 3a29 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:28:12.355 UTC [msp] DeserializeIdentity -> DEBU 3a2a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.356 UTC [msp] DeserializeIdentity -> DEBU 3a2b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.316 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc003a76f30 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.357 UTC [cauthdsl] func1 -> DEBU 3a2d 0xc003a76f30 gate 1556789292273744800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a2e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.368 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a31 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.370 UTC [policies] Evaluate -> DEBU 3a33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a34 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a35 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [gossip.gossip] handleMessage -> DEBU 3a36 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [gossip.gossip] handleMessage -> DEBU 3a37 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a38 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a39 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.373 UTC [msp] DeserializeIdentity -> DEBU 3a3a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [gossip.comm] Send -> DEBU 3a3b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a41 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a42 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.381 UTC [cauthdsl] func1 -> DEBU 3a46 0xc003da5910 gate 1556789292381536800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a47 0xc003da5910 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a48 0xc003da5910 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a49 0xc003da5910 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [msp.identity] Verify -> DEBU 3a4a Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:12.389 UTC [msp.identity] Verify -> DEBU 3a4b Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [cauthdsl] func2 -> DEBU 3a4c 0xc003da5910 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [cauthdsl] func1 -> DEBU 3a4d 0xc003da5910 gate 1556789292381536800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a50 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a52 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a53 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a55 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.399 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a57 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a58 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func1 -> DEBU 3a5c 0xc004265800 gate 1556789292400491900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5d 0xc004265800 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5e 0xc004265800 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc004265800 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a60 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a61 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [cauthdsl] func2 -> DEBU 3a62 0xc004265800 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [cauthdsl] func1 -> DEBU 3a63 0xc004265800 gate 1556789292400491900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a66 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a68 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a69 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6c Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6d Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a71 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a72 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func1 -> DEBU 3a76 0xc00228c050 gate 1556789292404990600 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a77 0xc00228c050 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a78 0xc00228c050 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a79 0xc00228c050 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.412 UTC [msp.identity] Verify -> DEBU 3a7a Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:12.419 UTC [msp.identity] Verify -> DEBU 3a7b Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:12.420 UTC [cauthdsl] func2 -> DEBU 3a7c 0xc00228c050 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [cauthdsl] func1 -> DEBU 3a7d 0xc00228c050 gate 1556789292404990600 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a80 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.426 UTC [msp.identity] Verify -> DEBU 3a82 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp.identity] Verify -> DEBU 3a83 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a84 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a85 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a87 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a88 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a89 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a8a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a8c 0xc00228df40 gate 1556789292431164200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8d 0xc00228df40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8e 0xc00228df40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8f 0xc00228df40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a90 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a91 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a92 0xc00228df40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a93 0xc00228df40 gate 1556789292431164200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a96 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [gossip.gossip] handleMessage -> DEBU 3a98 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [gossip.comm] func1 -> DEBU 3a99 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [gossip.gossip] handleMessage -> DEBU 3a9a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.538 UTC [gossip.gossip] handleMessage -> DEBU 3a9d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.578 UTC [gossip.comm] func1 -> DEBU 3a9e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:892584746407946289 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.578 UTC [gossip.gossip] handleMessage -> DEBU 3a9f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:892584746407946289 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.pull] HandleMessage -> DEBU 3aa0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:892584746407946289 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.pull] SendDigest -> DEBU 3aa1 Sending BLOCK_MSG digest: [7 8 1 2 3 4 5 6 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.gossip] handleMessage -> DEBU 3aa2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:12.762 UTC [gossip.comm] func1 -> DEBU 3aa3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.764 UTC [gossip.gossip] handleMessage -> DEBU 3aa4 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:12.765 UTC [msp] DeserializeIdentity -> DEBU 3aa5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.766 UTC [msp] DeserializeIdentity -> DEBU 3aa6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.767 UTC [msp] DeserializeIdentity -> DEBU 3aa7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:12.769 UTC [gossip.gossip] handleMessage -> DEBU 3aa8 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [gossip.comm] func1 -> DEBU 3aa9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [gossip.gossip] handleMessage -> DEBU 3aaa Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [msp] DeserializeIdentity -> DEBU 3aab Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aac Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aad Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [gossip.gossip] handleMessage -> DEBU 3aae Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.592 UTC [gossip.comm] func1 -> DEBU 3aaf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.592 UTC [gossip.gossip] handleMessage -> DEBU 3ab0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.593 UTC [gossip.gossip] handleMessage -> DEBU 3ab1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.594 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ab3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.595 UTC [msp] DeserializeIdentity -> DEBU 3ab4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ab5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:13.598 UTC [policies] Evaluate -> DEBU 3aba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.598 UTC [cauthdsl] func1 -> DEBU 3abb 0xc00363afa0 gate 1556789293598417900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abc 0xc00363afa0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abd 0xc00363afa0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abe 0xc00363afa0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [msp.identity] Verify -> DEBU 3abf Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V|
peer0.org1.example.com | 00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|"
peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [msp.identity] Verify -> DEBU 3ac0 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[|
peer0.org1.example.com | 00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il|
peer0.org1.example.com | 00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..|
peer0.org1.example.com | 00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T|
peer0.org1.example.com | 00000040 89 bb 53 c5 4e 51 |..S.NQ|"
peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [cauthdsl] func2 -> DEBU 3ac1 0xc00363afa0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [cauthdsl] func1 -> DEBU 3ac2 0xc00363afa0 gate 1556789293598417900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [policies] Evaluate -> DEBU 3ac3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.612 UTC [gossip.comm] func1 -> DEBU 3ac6 Got message: GossipMessage: tag:EMPTY hello:<nonce:14765531563141334116 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [gossip.gossip] handleMessage -> DEBU 3ac7 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:14765531563141334116 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [gossip.pull] HandleMessage -> DEBU 3ac8 GossipMessage: tag:EMPTY hello:<nonce:14765531563141334116 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [msp] DeserializeIdentity -> DEBU 3ac9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3aca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.617 UTC [msp] DeserializeIdentity -> DEBU 3ace Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.618 UTC [gossip.pull] SendDigest -> DEBU 3acf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:13.618 UTC [gossip.gossip] handleMessage -> DEBU 3ad0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 "
peer0.org1.example.com | "2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 "
peer0.org1.example.com | "2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:13.623 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102B "
peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad9 Sign: digest: F05B313F24126515C171AC32D2C41D0112118C5D6B111DC167604649DFB72F26 "
peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ada Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3adb Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:13.629 UTC [gossip.comm] Send -> DEBU 3adc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3add Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ade Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3adf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ae0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ae7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ae8 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3ae9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aeb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.comm] Send -> DEBU 3aed Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3aee Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.comm] sendToEndpoint -> DEBU 3aef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3af0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af1 Got message: GossipMessage: tag:EMPTY hello:<nonce:4578455974003873628 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.gossip] handleMessage -> DEBU 3af3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:4578455974003873628 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.645 UTC [gossip.pull] HandleMessage -> DEBU 3af4 GossipMessage: tag:EMPTY hello:<nonce:4578455974003873628 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.646 UTC [gossip.pull] SendDigest -> DEBU 3af5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:13.648 UTC [gossip.gossip] handleMessage -> DEBU 3af6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.649 UTC [gossip.gossip] handleMessage -> DEBU 3af7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.653 UTC [gossip.comm] func1 -> DEBU 3af8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.654 UTC [gossip.comm] func1 -> DEBU 3af9 Got message: GossipMessage: tag:EMPTY hello:<nonce:14235464196629553968 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afa Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.659 UTC [gossip.comm] func1 -> DEBU 3afc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3afd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.661 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3afe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3aff Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....|
peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|"
peer0.org1.example.com | "2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3b00 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...|
peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`|
peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5|
peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..|
peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|"
peer0.org1.example.com | "2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b01 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b02 Verify: sig = 00000000 30 44 02 20 3e 3d 7d 57 33 da b5 3a 15 0d 9c a3 |0D. >=}W3..:....|
peer0.org1.example.com | 00000010 42 47 a1 59 e3 5b 4b eb 2c a2 b1 82 59 c6 fd e9 |BG.Y.[K.,...Y...|
peer0.org1.example.com | 00000020 00 61 74 e2 02 20 5f 66 2d 4f 6b 63 64 7d ca a4 |.at.. _f-Okcd}..|
peer0.org1.example.com | 00000030 5a 19 9a 4e d2 92 55 bb 8c 93 da ff f1 c1 05 e1 |Z..N..U.........|
peer0.org1.example.com | 00000040 b4 bf f4 3d 7b 58 |...={X|"
peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b03 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] isSentByMe -> DEBU 3b04 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b05 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.670 UTC [gossip.comm] func1 -> DEBU 3b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.679 UTC [gossip.comm] func1 -> DEBU 3b07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b08 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b09 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [msp.identity] Verify -> DEBU 3b0b Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.|
peer0.org1.example.com | 00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|"
peer0.org1.example.com | "2019-05-02 09:28:13.681 UTC [msp.identity] Verify -> DEBU 3b0c Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.|
peer0.org1.example.com | 00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......|
peer0.org1.example.com | 00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1<u.2|
peer0.org1.example.com | 00000030 93 f6 fa 8d ab 1e cf 7a a1 1e e0 1d 0a 0a aa 07 |.......z........|
peer0.org1.example.com | 00000040 8d fb 9d 64 cb 4e |...d.N|"
peer0.org1.example.com | "2019-05-02 09:28:13.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.682 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b10 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....|
peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|"
peer0.org1.example.com | "2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b11 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...|
peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`|
peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5|
peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..|
peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|"
peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b12 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] isSentByMe -> DEBU 3b13 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b14 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.685 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b15 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.685 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b18 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b19 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [cauthdsl] func1 -> DEBU 3b1d 0xc0041187e0 gate 1556789293687555000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [cauthdsl] func2 -> DEBU 3b1e 0xc0041187e0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b1f 0xc0041187e0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b20 0xc0041187e0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b21 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...|
peer0.org1.example.com | 00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|"
peer0.org1.example.com | "2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b22 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9|
peer0.org1.example.com | 00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.|
peer0.org1.example.com | 00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.|
peer0.org1.example.com | 00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .|
peer0.org1.example.com | 00000040 b5 b7 7f 38 7e 61 1c |...8~a.|"
peer0.org1.example.com | "2019-05-02 09:28:13.691 UTC [cauthdsl] func2 -> DEBU 3b23 0xc0041187e0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.691 UTC [cauthdsl] func1 -> DEBU 3b24 0xc0041187e0 gate 1556789293687555000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b27 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b29 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.gossip] handleMessage -> DEBU 3b2c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [gossip.gossip] handleMessage -> DEBU 3b2d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14235464196629553968 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [gossip.pull] HandleMessage -> DEBU 3b2e GossipMessage: tag:EMPTY hello:<nonce:14235464196629553968 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [msp] DeserializeIdentity -> DEBU 3b2f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b31 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b33 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [msp] DeserializeIdentity -> DEBU 3b34 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.pull] SendDigest -> DEBU 3b35 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b36 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b37 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b38 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b39 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b3a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b3b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3c Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[|
peer0.org1.example.com | 00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|"
peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3d Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......|
peer0.org1.example.com | 00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...|
peer0.org1.example.com | 00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..|
peer0.org1.example.com | 00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..|
peer0.org1.example.com | 00000040 6c 80 78 51 9f 1c |l.xQ..|"
peer0.org1.example.com | "2019-05-02 09:28:13.699 UTC [msp.identity] Verify -> DEBU 3b3e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:13.700 UTC [msp.identity] Verify -> DEBU 3b3f Verify: sig = 00000000 30 44 02 20 3f a4 21 18 e3 6c c1 a9 0d 99 00 98 |0D. ?.!..l......|
peer0.org1.example.com | 00000010 89 c3 0e d4 84 b3 12 57 b5 1f 3b e0 ac 87 d4 23 |.......W..;....#|
peer0.org1.example.com | 00000020 b4 aa 5d ce 02 20 7e eb c3 76 b7 71 5b b7 d0 39 |..].. ~..v.q[..9|
peer0.org1.example.com | 00000030 69 f2 26 74 d5 fb e5 61 00 95 fb f8 e9 96 ef 34 |i.&t...a.......4|
peer0.org1.example.com | 00000040 30 0c 04 28 0a 3d |0..(.=|"
peer0.org1.example.com | "2019-05-02 09:28:13.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b41 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b42 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 "
peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b43 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 "
peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b44 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b45 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b46 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b47 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b49 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.705 UTC [msp] DeserializeIdentity -> DEBU 3b4a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b4b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:13.707 UTC [policies] Evaluate -> DEBU 3b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.707 UTC [cauthdsl] func1 -> DEBU 3b51 0xc0041bcfb0 gate 1556789293707387900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b52 0xc0041bcfb0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b53 0xc0041bcfb0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [cauthdsl] func2 -> DEBU 3b54 0xc0041bcfb0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b55 Verify: digest = 00000000 a1 24 f4 01 ff 3e 39 31 ab 8e bd 16 8d de fe ed |.$...>91........|
peer0.org1.example.com | 00000010 c1 9d 9c 4b 55 5e 86 75 bb 71 96 0d 40 dd 63 b1 |...KU^.u.q..@.c.|"
peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b56 Verify: sig = 00000000 30 44 02 20 62 e5 16 b4 05 b5 6f c7 6f 01 f4 4f |0D. b.....o.o..O|
peer0.org1.example.com | 00000010 31 69 45 75 9f 76 4f c5 ef 3d 9e 03 1d 56 f3 80 |1iEu.vO..=...V..|
peer0.org1.example.com | 00000020 cc 79 4b 96 02 20 66 bd 6f b2 f8 0b 91 9a 2b ac |.yK.. f.o.....+.|
peer0.org1.example.com | 00000030 89 37 74 4f 4b 69 39 fe 9b c0 4a 9d 8b ca c8 34 |.7tOKi9...J....4|
peer0.org1.example.com | 00000040 4e f2 7f ac a0 00 |N.....|"
peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [cauthdsl] func2 -> DEBU 3b57 0xc0041bcfb0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [cauthdsl] func1 -> DEBU 3b58 0xc0041bcfb0 gate 1556789293707387900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b59 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b5d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b60 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b61 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b62 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b63 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b64 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.714 UTC [gossip.discovery] sendMemResponse -> DEBU 3b65 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:13.714 UTC [msp] DeserializeIdentity -> DEBU 3b66 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.716 UTC [msp] DeserializeIdentity -> DEBU 3b67 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [msp] DeserializeIdentity -> DEBU 3b68 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [gossip.comm] Send -> DEBU 3b69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.720 UTC [gossip.comm] Send -> DEBU 3b70 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.720 UTC [gossip.discovery] sendMemResponse -> DEBU 3b71 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b72 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b73 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b74 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b75 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.gossip] handleMessage -> DEBU 3b76 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b77 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b78 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.723 UTC [msp.identity] Verify -> DEBU 3b79 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....|
peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|"
peer0.org1.example.com | "2019-05-02 09:28:13.724 UTC [msp.identity] Verify -> DEBU 3b7a Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...|
peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`|
peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5|
peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..|
peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|"
peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] isSentByMe -> DEBU 3b7c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.726 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b7e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.726 UTC [msp.identity] Verify -> DEBU 3b7f Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[|
peer0.org1.example.com | 00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|"
peer0.org1.example.com | "2019-05-02 09:28:13.727 UTC [msp.identity] Verify -> DEBU 3b80 Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......|
peer0.org1.example.com | 00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...|
peer0.org1.example.com | 00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..|
peer0.org1.example.com | 00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..|
peer0.org1.example.com | 00000040 6c 80 78 51 9f 1c |l.xQ..|"
peer0.org1.example.com | "2019-05-02 09:28:13.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b81 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b82 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b83 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [msp] DeserializeIdentity -> DEBU 3b84 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b86 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b87 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [cauthdsl] func1 -> DEBU 3b8b 0xc00430dbc0 gate 1556789293730955800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8c 0xc00430dbc0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8d 0xc00430dbc0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8e 0xc00430dbc0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [msp.identity] Verify -> DEBU 3b8f Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V|
peer0.org1.example.com | 00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|"
peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [msp.identity] Verify -> DEBU 3b90 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[|
peer0.org1.example.com | 00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il|
peer0.org1.example.com | 00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..|
peer0.org1.example.com | 00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T|
peer0.org1.example.com | 00000040 89 bb 53 c5 4e 51 |..S.NQ|"
peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [cauthdsl] func2 -> DEBU 3b91 0xc00430dbc0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [cauthdsl] func1 -> DEBU 3b92 0xc00430dbc0 gate 1556789293730955800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [policies] Evaluate -> DEBU 3b93 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b95 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b98 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b99 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [gossip.pull] Hello -> DEBU 3b9c Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.737 UTC [gossip.comm] Send -> DEBU 3b9f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8087694384524145658 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.737 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8087694384524145658 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.738 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.741 UTC [gossip.pull] Hello -> DEBU 3ba2 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:13.741 UTC [gossip.comm] Send -> DEBU 3ba3 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10522915394422428203 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba4 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.comm] Send -> DEBU 3ba5 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5211070648313222613 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:13.743 UTC [gossip.comm] Send -> DEBU 3ba7 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10722611922427056407 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10722611922427056407 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3baa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10522915394422428203 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.745 UTC [gossip.comm] sendToEndpoint -> DEBU 3bab Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5211070648313222613 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bad Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.749 UTC [gossip.comm] func1 -> DEBU 3bae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.750 UTC [gossip.comm] func1 -> DEBU 3baf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.750 UTC [gossip.gossip] handleMessage -> DEBU 3bb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.pull] HandleMessage -> DEBU 3bb1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.752 UTC [gossip.pull] HandleMessage -> DEBU 3bb4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.752 UTC [gossip.gossip] handleMessage -> DEBU 3bb5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.gossip] handleMessage -> DEBU 3bb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.755 UTC [gossip.pull] HandleMessage -> DEBU 3bb9 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.755 UTC [gossip.gossip] handleMessage -> DEBU 3bba Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.pull] HandleMessage -> DEBU 3bbc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.comm] func1 -> DEBU 3bbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bc0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.785 UTC [gossip.comm] func1 -> DEBU 3bc2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.785 UTC [gossip.gossip] handleMessage -> DEBU 3bc3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.784 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:13.787 UTC [gossip.comm] func1 -> DEBU 3bc5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.788 UTC [msp] DeserializeIdentity -> DEBU 3bc6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bc7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc8 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc9 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [policies] Evaluate -> DEBU 3bca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [cauthdsl] func1 -> DEBU 3bcd 0xc0034e2690 gate 1556789293791713300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [cauthdsl] func2 -> DEBU 3bce 0xc0034e2690 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bcf 0xc0034e2690 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bd0 0xc0034e2690 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.793 UTC [msp.identity] Verify -> DEBU 3bd1 Verify: digest = 00000000 5c 09 0d 2f 46 d3 15 b5 71 aa 4d f5 f3 f8 43 e2 |\../F...q.M...C.|
peer0.org1.example.com | 00000010 8f e8 22 ed b6 54 2c f6 18 52 aa c2 60 f9 ac c2 |.."..T,..R..`...|"
peer0.org1.example.com | "2019-05-02 09:28:13.794 UTC [msp.identity] Verify -> DEBU 3bd2 Verify: sig = 00000000 30 44 02 20 77 00 11 eb 8b 44 14 88 fa 2a 1a 67 |0D. w....D...*.g|
peer0.org1.example.com | 00000010 0a fb 8b 0d de 91 7d 63 22 77 db 4e 35 2e 9a 84 |......}c"w.N5...|
peer0.org1.example.com | 00000020 29 e3 a3 7c 02 20 68 fd cb 4e 05 29 b2 8b 4a 1d |)..|. h..N.)..J.|
peer0.org1.example.com | 00000030 19 d6 17 3f 26 1f e9 16 5a 48 48 88 ed ac 2f 07 |...?&...ZHH.../.|
peer0.org1.example.com | 00000040 31 42 15 d6 c2 ff |1B....|"
peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [cauthdsl] func2 -> DEBU 3bd3 0xc0034e2690 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [cauthdsl] func1 -> DEBU 3bd4 0xc0034e2690 gate 1556789293791713300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [policies] Evaluate -> DEBU 3bd5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd7 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.797 UTC [policies] Evaluate -> DEBU 3bd8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:13.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bda Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdb updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 "
peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 "
peer0.org1.example.com | "2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bde Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bdf Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be2 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.gossip] handleMessage -> DEBU 3be5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3beb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bec Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bed Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bee Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [gossip.comm] Send -> DEBU 3bef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bf0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] Send -> DEBU 3bf1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:13.806 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102C "
peer0.org1.example.com | "2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf7 Sign: digest: BCFC79A684F20A2FECB5877BB67D925313B55CDC2738C810E34B07D6C1EEAFCB "
peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3bfa Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfc Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3bfe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bff Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c01 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c03 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c05 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c06 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 3c07 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.comm] func1 -> DEBU 3c08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c09 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c0a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c0c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0d Verify: digest = 00000000 18 7c fa c5 c5 fc a0 86 5b f1 ab f9 1a ad 89 97 |.|......[.......|
peer0.org1.example.com | 00000010 86 c3 4c 2d 8e bf 9d ec 46 4e a6 62 bb 46 3e 23 |..L-....FN.b.F>#|"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0e Verify: sig = 00000000 30 45 02 21 00 ef 73 c4 c5 33 6d f2 24 63 29 f7 |0E.!..s..3m.$c).|
peer0.org1.example.com | 00000010 87 43 0e 02 07 4e d5 c5 64 02 95 e3 c6 f2 ed b4 |.C...N..d.......|
peer0.org1.example.com | 00000020 d6 6d 98 46 29 02 20 1f 7f 79 3c ad bf e7 d4 06 |.m.F). ..y<.....|
peer0.org1.example.com | 00000030 b0 ae 4e c9 aa 0c 2f 45 53 ba 35 72 39 bc 86 4d |..N.../ES.5r9..M|
peer0.org1.example.com | 00000040 38 11 16 0b 84 29 32 |8....)2|"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c10 Verify: sig = 00000000 30 44 02 20 3a 06 a4 d6 15 25 4a 5d 27 e7 ad aa |0D. :....%J]'...|
peer0.org1.example.com | 00000010 fb 31 b0 0c 27 49 51 ae 65 59 92 6e 5c 59 f9 07 |.1..'IQ.eY.n\Y..|
peer0.org1.example.com | 00000020 cf 37 b3 73 02 20 54 d5 a5 4f ee 83 d6 03 67 ad |.7.s. T..O....g.|
peer0.org1.example.com | 00000030 14 70 5c 17 c9 31 7d 0f 62 6d fa 3c 85 c1 fe d7 |.p\..1}.bm.<....|
peer0.org1.example.com | 00000040 3b db de 03 0e ac |;.....|"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c13 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 "
peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 "
peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c16 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c17 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c18 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c1f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c20 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c21 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c22 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.075 UTC [gossip.comm] func1 -> DEBU 3c23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c24 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c25 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c27 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.comm] func1 -> DEBU 3c28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c29 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c2a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.comm] func1 -> DEBU 3c2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c31 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [msp] DeserializeIdentity -> DEBU 3c32 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c34 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c35 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func1 -> DEBU 3c39 0xc0042afd40 gate 1556789294149285000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3a 0xc0042afd40 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3b 0xc0042afd40 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3c 0xc0042afd40 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3d Verify: digest = 00000000 05 dc ff 52 2e 71 34 e1 f1 a6 f3 d0 ab 80 7d 1d |...R.q4.......}.|
peer0.org1.example.com | 00000010 b2 c3 46 46 75 b5 c6 53 1c 82 8a 2d 6f 15 10 1b |..FFu..S...-o...|"
peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3e Verify: sig = 00000000 30 44 02 20 02 4a d8 7b 18 45 cd 55 d9 25 ad 1a |0D. .J.{.E.U.%..|
peer0.org1.example.com | 00000010 0a 9a da 2f a8 28 1c 83 11 31 34 ee 00 c6 33 ad |.../.(...14...3.|
peer0.org1.example.com | 00000020 ce 7d cc 96 02 20 75 d6 99 d9 cc b3 64 ee c4 a3 |.}... u.....d...|
peer0.org1.example.com | 00000030 2b f7 db 2d 1c 9c 2a 36 7d d4 4c 4d df 18 8f e7 |+..-..*6}.LM....|
peer0.org1.example.com | 00000040 07 18 f8 7b d6 0b |...{..|"
peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [cauthdsl] func2 -> DEBU 3c3f 0xc0042afd40 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [cauthdsl] func1 -> DEBU 3c40 0xc0042afd40 gate 1556789294149285000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:14.152 UTC [policies] Evaluate -> DEBU 3c41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:14.159 UTC [policies] Evaluate -> DEBU 3c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:14.162 UTC [policies] Evaluate -> DEBU 3c43 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:14.170 UTC [policies] Evaluate -> DEBU 3c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:14.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c46 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.comm] func1 -> DEBU 3c47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.gossip] handleMessage -> DEBU 3c48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c49 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 "
peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c4d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.193 UTC [gossip.comm] func1 -> DEBU 3c4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c50 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c51 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.196 UTC [msp] DeserializeIdentity -> DEBU 3c52 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c53 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c55 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c56 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c57 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c58 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.208 UTC [gossip.gossip] handleMessage -> DEBU 3c60 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.209 UTC [gossip.gossip] handleMessage -> DEBU 3c61 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.210 UTC [gossip.gossip] handleMessage -> DEBU 3c62 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:14.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:14.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c64 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.213 UTC [msp] DeserializeIdentity -> DEBU 3c65 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [msp] DeserializeIdentity -> DEBU 3c66 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] Send -> DEBU 3c67 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c69 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.216 UTC [gossip.comm] func1 -> DEBU 3c6e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.216 UTC [gossip.gossip] handleMessage -> DEBU 3c6f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.217 UTC [gossip.comm] func1 -> DEBU 3c70 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.217 UTC [msp] DeserializeIdentity -> DEBU 3c71 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c72 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c73 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [gossip.comm] func1 -> DEBU 3c74 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c76 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c77 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func1 -> DEBU 3c7b 0xc00239d000 gate 1556789296221442800 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7c 0xc00239d000 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7d 0xc00239d000 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.222 UTC [cauthdsl] func2 -> DEBU 3c7e 0xc00239d000 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.222 UTC [msp.identity] Verify -> DEBU 3c7f Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:16.223 UTC [msp.identity] Verify -> DEBU 3c80 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:16.224 UTC [cauthdsl] func2 -> DEBU 3c81 0xc00239d000 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.224 UTC [cauthdsl] func1 -> DEBU 3c82 0xc00239d000 gate 1556789296221442800 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c85 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.226 UTC [msp.identity] Verify -> DEBU 3c87 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:16.227 UTC [msp.identity] Verify -> DEBU 3c88 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:16.227 UTC [msp] DeserializeIdentity -> DEBU 3c89 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.228 UTC [msp] DeserializeIdentity -> DEBU 3c8a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8c Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8d Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.230 UTC [policies] Evaluate -> DEBU 3c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.230 UTC [cauthdsl] func1 -> DEBU 3c91 0xc0026daef0 gate 1556789296230552000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c92 0xc0026daef0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c93 0xc0026daef0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0026daef0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c95 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c96 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [cauthdsl] func2 -> DEBU 3c97 0xc0026daef0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.233 UTC [cauthdsl] func1 -> DEBU 3c98 0xc0026daef0 gate 1556789296230552000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.233 UTC [policies] Evaluate -> DEBU 3c99 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9b Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9d Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9e Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [gossip.gossip] handleMessage -> DEBU 3c9f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [gossip.gossip] handleMessage -> DEBU 3ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [policies] Evaluate -> DEBU 3caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func1 -> DEBU 3cab 0xc0035a7740 gate 1556789296239233500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cac 0xc0035a7740 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cad 0xc0035a7740 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cae 0xc0035a7740 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3caf Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3cb0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [cauthdsl] func2 -> DEBU 3cb1 0xc0035a7740 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [cauthdsl] func1 -> DEBU 3cb2 0xc0035a7740 gate 1556789296239233500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.243 UTC [msp.identity] Verify -> DEBU 3cb7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:16.244 UTC [msp.identity] Verify -> DEBU 3cb8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cbb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [gossip.privdata] run -> DEBU 3cba Start reconcile missing private info"
peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbd Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbe Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc2 0xc003e47630 gate 1556789296247325900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc3 0xc003e47630 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc4 0xc003e47630 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc5 0xc003e47630 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc6 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc7 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc003e47630 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc9 0xc003e47630 gate 1556789296247325900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3cca Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccc Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3cce Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3ccf Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func1 -> DEBU 3cd9 0xc00438b140 gate 1556789296249519400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cda 0xc00438b140 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdb 0xc00438b140 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdc 0xc00438b140 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cdd Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cde Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc00438b140 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [cauthdsl] func1 -> DEBU 3ce0 0xc00438b140 gate 1556789296249519400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [msp.identity] Verify -> DEBU 3ce5 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp.identity] Verify -> DEBU 3ce6 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ce9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cea Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ceb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3ced This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cef 0xc002763030 gate 1556789296252069200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf0 0xc002763030 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf1 0xc002763030 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf2 0xc002763030 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf5 0xc002763030 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cf6 0xc002763030 gate 1556789296252069200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cf9 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfb Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfc Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [gossip.gossip] handleMessage -> DEBU 3cfd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [leveldbhelper] GetIterator -> DEBU 3cfe Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]"
peer0.org1.example.com | "2019-05-02 09:28:16.254 UTC [gossip.privdata] reconcile -> DEBU 3cff Reconciliation cycle finished successfully. no items to reconcile"
peer0.org1.example.com | "2019-05-02 09:28:16.470 UTC [gossip.comm] func1 -> DEBU 3d00 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d01 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d02 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d03 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d04 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.544 UTC [gossip.comm] func1 -> DEBU 3d05 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15867266642747753642 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.544 UTC [gossip.gossip] handleMessage -> DEBU 3d06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15867266642747753642 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.545 UTC [gossip.pull] HandleMessage -> DEBU 3d07 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15867266642747753642 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.545 UTC [gossip.pull] SendDigest -> DEBU 3d08 Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:16.546 UTC [gossip.gossip] handleMessage -> DEBU 3d09 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.716 UTC [gossip.comm] func1 -> DEBU 3d0a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.716 UTC [gossip.gossip] handleMessage -> DEBU 3d0b Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [gossip.gossip] handleMessage -> DEBU 3d0f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:16.951 UTC [gossip.comm] func1 -> DEBU 3d10 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.951 UTC [gossip.gossip] handleMessage -> DEBU 3d11 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:16.952 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.959 UTC [msp] DeserializeIdentity -> DEBU 3d13 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.960 UTC [msp] DeserializeIdentity -> DEBU 3d14 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:16.961 UTC [gossip.gossip] handleMessage -> DEBU 3d15 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d16 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] IsLeader -> DEBU 3d17 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true"
peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d18 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100D1801 "
peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d19 Sign: digest: EA9514E5B5DE87377206684C8235829BFEC895424EB23EE05ABC0126D9AD2AC3 "
peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d1a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering"
peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] Send -> DEBU 3d1f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d20 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d21 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d22 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d23 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.comm] func1 -> DEBU 3d24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d25 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d26 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d28 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.601 UTC [msp] DeserializeIdentity -> DEBU 3d29 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.603 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:17.605 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func1 -> DEBU 3d30 0xc004374b80 gate 1556789297607083900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d31 0xc004374b80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d32 0xc004374b80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d33 0xc004374b80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.613 UTC [gossip.comm] func1 -> DEBU 3d34 Got message: GossipMessage: tag:EMPTY hello:<nonce:16622900013509798060 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [gossip.gossip] handleMessage -> DEBU 3d35 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:16622900013509798060 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [gossip.pull] HandleMessage -> DEBU 3d36 GossipMessage: tag:EMPTY hello:<nonce:16622900013509798060 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [msp] DeserializeIdentity -> DEBU 3d37 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.621 UTC [msp] DeserializeIdentity -> DEBU 3d38 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d39 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d3a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.626 UTC [gossip.pull] SendDigest -> DEBU 3d3d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:17.627 UTC [gossip.gossip] handleMessage -> DEBU 3d3e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.613 UTC [msp.identity] Verify -> DEBU 3d3f Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._|
peer0.org1.example.com | 00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|"
peer0.org1.example.com | "2019-05-02 09:28:17.643 UTC [msp.identity] Sign -> DEBU 3d40 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102D "
peer0.org1.example.com | "2019-05-02 09:28:17.650 UTC [msp.identity] Sign -> DEBU 3d41 Sign: digest: 8B923E02083CAF7B287C02E755358EE8E03BBC263E640CB3BA4223F63DD9973B "
peer0.org1.example.com | "2019-05-02 09:28:17.641 UTC [msp.identity] Verify -> DEBU 3d42 Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b|
peer0.org1.example.com | 00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..|
peer0.org1.example.com | 00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J|
peer0.org1.example.com | 00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d|
peer0.org1.example.com | 00000040 74 33 4c ce 78 21 |t3L.x!|"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [cauthdsl] func2 -> DEBU 3d43 0xc004374b80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [cauthdsl] func1 -> DEBU 3d44 0xc004374b80 gate 1556789297607083900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d47 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d49 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 "
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d4f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d50 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d51 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d52 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d53 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] Send -> DEBU 3d55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d57 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d58 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.687 UTC [msp.identity] Sign -> DEBU 3d59 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp.identity] Sign -> DEBU 3d5a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d61 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d63 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d64 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d65 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d66 Got message: GossipMessage: tag:EMPTY hello:<nonce:7186347043342038113 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.gossip] handleMessage -> DEBU 3d68 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:7186347043342038113 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.pull] HandleMessage -> DEBU 3d69 GossipMessage: tag:EMPTY hello:<nonce:7186347043342038113 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.pull] SendDigest -> DEBU 3d70 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d71 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d72 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d73 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d75 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d76 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d78 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d79 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d7d 0xc003cfc600 gate 1556789297691143400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003cfc600 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7f 0xc003cfc600 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d80 0xc003cfc600 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d81 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!|
peer0.org1.example.com | 00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d82 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{|
peer0.org1.example.com | 00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.|
peer0.org1.example.com | 00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<|
peer0.org1.example.com | 00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x|
peer0.org1.example.com | 00000040 05 3c ed e4 b2 b5 8a |.<.....|"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d83 0xc003cfc600 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d84 0xc003cfc600 gate 1556789297691143400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d89 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.696 UTC [gossip.comm] func1 -> DEBU 3d8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.696 UTC [gossip.gossip] handleMessage -> DEBU 3d8b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.701 UTC [gossip.comm] func1 -> DEBU 3d8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:17.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 "
peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 "
peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d90 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d91 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d92 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] sendMemResponse -> DEBU 3d93 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [msp] DeserializeIdentity -> DEBU 3d94 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d95 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d96 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.comm] Send -> DEBU 3d97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.discovery] sendMemResponse -> DEBU 3d98 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3d99 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3d9a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d9f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.709 UTC [msp] DeserializeIdentity -> DEBU 3da0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da2 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da3 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func1 -> DEBU 3da7 0xc0020e8850 gate 1556789297711225300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da8 0xc0020e8850 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da9 0xc0020e8850 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:17.712 UTC [cauthdsl] func2 -> DEBU 3daa 0xc0020e8850 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.712 UTC [msp.identity] Verify -> DEBU 3dab Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._|
peer0.org1.example.com | 00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|"
peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [msp.identity] Verify -> DEBU 3dac Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b|
peer0.org1.example.com | 00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..|
peer0.org1.example.com | 00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J|
peer0.org1.example.com | 00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d|
peer0.org1.example.com | 00000040 74 33 4c ce 78 21 |t3L.x!|"
peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [cauthdsl] func2 -> DEBU 3dad 0xc0020e8850 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [cauthdsl] func1 -> DEBU 3dae 0xc0020e8850 gate 1556789297711225300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3daf Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db1 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3db5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db6 Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..|
peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|"
peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db7 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9|
peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.|
peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...|
peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...|
peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] isSentByMe -> DEBU 3db9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dba Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.gossip] handleMessage -> DEBU 3dbd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dbe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dbf Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..|
peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|"
peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dc0 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9|
peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.|
peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...|
peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...|
peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|"
peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] isSentByMe -> DEBU 3dc2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc7 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc8 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [cauthdsl] func1 -> DEBU 3dcc 0xc00304dc90 gate 1556789297719537500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc00304dc90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dce 0xc00304dc90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc00304dc90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd0 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!|
peer0.org1.example.com | 00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|"
peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd1 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{|
peer0.org1.example.com | 00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.|
peer0.org1.example.com | 00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<|
peer0.org1.example.com | 00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x|
peer0.org1.example.com | 00000040 05 3c ed e4 b2 b5 8a |.<.....|"
peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dd2 0xc00304dc90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [cauthdsl] func1 -> DEBU 3dd3 0xc00304dc90 gate 1556789297719537500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd6 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dda Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.732 UTC [gossip.comm] func1 -> DEBU 3ddb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.comm] func1 -> DEBU 3ddc Got message: GossipMessage: tag:EMPTY hello:<nonce:18126125731908043997 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3ddd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3dde Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.gossip] handleMessage -> DEBU 3ddf Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:18126125731908043997 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.pull] HandleMessage -> DEBU 3de0 GossipMessage: tag:EMPTY hello:<nonce:18126125731908043997 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.pull] SendDigest -> DEBU 3de1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.gossip] handleMessage -> DEBU 3de2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3de4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de5 Verify: digest = 00000000 8e 00 7c a6 60 fd 6e e1 31 88 5b d1 e3 ca fb 8c |..|.`.n.1.[.....|
peer0.org1.example.com | 00000010 26 3e d1 3c 81 fb 8f fa c6 75 e9 ad c1 74 13 cd |&>.<.....u...t..|"
peer0.org1.example.com | "2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de6 Verify: sig = 00000000 30 44 02 20 2d ae 71 0f 53 f8 6a bc f4 fa 0e 6a |0D. -.q.S.j....j|
peer0.org1.example.com | 00000010 23 c8 87 57 43 5d 0d cb ce e7 55 14 1b 26 58 1b |#..WC]....U..&X.|
peer0.org1.example.com | 00000020 78 8a da 03 02 20 02 59 9e d5 19 cf 66 a4 17 a2 |x.... .Y....f...|
peer0.org1.example.com | 00000030 ef 65 90 bf 38 a8 e7 53 b4 a8 be 5a 1f 58 39 38 |.e..8..S...Z.X98|
peer0.org1.example.com | 00000040 9c fc 08 f7 62 39 |....b9|"
peer0.org1.example.com | "2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de8 Verify: sig = 00000000 30 44 02 20 75 11 61 e0 d6 ff 84 46 32 08 f6 13 |0D. u.a....F2...|
peer0.org1.example.com | 00000010 66 02 da 65 df 5e 2c 63 0a 6a 2c 52 45 b8 61 8e |f..e.^,c.j,RE.a.|
peer0.org1.example.com | 00000020 92 cd 62 7d 02 20 6f 8b af 48 1b 28 26 11 ca 2d |..b}. o..H.(&..-|
peer0.org1.example.com | 00000030 34 b1 ab 64 e6 12 1b 5b ea 92 d8 79 14 07 ea 64 |4..d...[...y...d|
peer0.org1.example.com | 00000040 cb b2 24 50 47 2f |..$PG/|"
peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dea Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3deb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 "
peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dec Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 "
peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ded Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dee Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 3def Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3df0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [gossip.discovery] sendMemResponse -> DEBU 3df1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [msp] DeserializeIdentity -> DEBU 3df2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [msp] DeserializeIdentity -> DEBU 3df3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [gossip.comm] Send -> DEBU 3df4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [gossip.discovery] sendMemResponse -> DEBU 3df5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df7 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.771 UTC [gossip.comm] func1 -> DEBU 3df8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3df9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3dfa Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dfb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dfc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfd Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..|
peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|"
peer0.org1.example.com | "2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfe Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9|
peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.|
peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...|
peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...|
peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|"
peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3dff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3e00 Verify: sig = 00000000 30 44 02 20 14 83 93 06 29 d9 29 65 89 e2 e3 0c |0D. ....).)e....|
peer0.org1.example.com | 00000010 45 fe d5 31 d5 a7 ef 7d f8 07 fd b3 0e fe 12 4a |E..1...}.......J|
peer0.org1.example.com | 00000020 2f 2d 40 09 02 20 4d 3b 62 8d 9d 1b a0 5f 38 0c |/-@.. M;b...._8.|
peer0.org1.example.com | 00000030 2c 7b ab 8d fa ed 0e 9c e1 60 b7 58 f2 9e fe 2d |,{.......`.X...-|
peer0.org1.example.com | 00000040 c8 f4 47 4c 33 a0 |..GL3.|"
peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e01 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] isSentByMe -> DEBU 3e02 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e03 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e04 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [gossip.pull] Hello -> DEBU 3e05 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [msp] DeserializeIdentity -> DEBU 3e08 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [gossip.comm] Send -> DEBU 3e07 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3024106290083695586 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e09 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0a Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10570254373589169019 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0c Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6643126557587392879 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0d Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6643126557587392879 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e10 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e11 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3024106290083695586 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e13 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] Send -> DEBU 3e14 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6290708047405863089 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e15 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6290708047405863089 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e16 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10570254373589169019 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e17 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e18 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e19 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e1a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1f GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e20 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.848 UTC [gossip.comm] func1 -> DEBU 3e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.848 UTC [gossip.gossip] handleMessage -> DEBU 3e22 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.849 UTC [gossip.pull] HandleMessage -> DEBU 3e23 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.849 UTC [gossip.gossip] handleMessage -> DEBU 3e24 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:17.850 UTC [gossip.comm] func1 -> DEBU 3e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.850 UTC [gossip.gossip] handleMessage -> DEBU 3e26 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.851 UTC [gossip.pull] HandleMessage -> DEBU 3e27 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:17.851 UTC [gossip.gossip] handleMessage -> DEBU 3e28 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.251 UTC [endorser] ProcessProposal -> DEBU 3e29 Entering: request from 172.18.0.8:57486"
peer0.org1.example.com | "2019-05-02 09:28:18.252 UTC [protoutils] ValidateProposalMessage -> DEBU 3e2a ValidateProposalMessage starts for signed proposal 0xc00305e5f0"
peer0.org1.example.com | "2019-05-02 09:28:18.252 UTC [protoutils] validateChannelHeader -> DEBU 3e2b validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2c begin"
peer0.org1.example.com | "2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:28:18.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2e creator is valid"
peer0.org1.example.com | "2019-05-02 09:28:18.254 UTC [msp.identity] Verify -> DEBU 3e2f Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.|
peer0.org1.example.com | 00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|"
peer0.org1.example.com | "2019-05-02 09:28:18.255 UTC [msp.identity] Verify -> DEBU 3e30 Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0|
peer0.org1.example.com | 00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..|
peer0.org1.example.com | 00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....|
peer0.org1.example.com | 00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....|
peer0.org1.example.com | 00000040 e3 c1 76 f7 71 37 3f |..v.q7?|"
peer0.org1.example.com | "2019-05-02 09:28:18.255 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e31 exits successfully"
peer0.org1.example.com | "2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e32 validateChaincodeProposalMessage starts for proposal 0xc002643e30, header 0xc00305ea00"
peer0.org1.example.com | "2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e33 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] preProcess -> DEBU 3e34 [][6092491a] processing txid: 6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8"
peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] SimulateProposal -> DEBU 3e35 [][6092491a] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] callChaincode -> INFO 3e36 [][6092491a] Entry chaincode: name:"cscc" "
peer0.org1.example.com | "2019-05-02 09:28:18.258 UTC [chaincode] Execute -> DEBU 3e37 Entry"
peer0.org1.example.com | "2019-05-02 09:28:18.259 UTC [cscc] Invoke -> DEBU 3e38 Invoke function: GetChannels"
peer0.org1.example.com | "2019-05-02 09:28:18.260 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.|
peer0.org1.example.com | 00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|"
peer0.org1.example.com | "2019-05-02 09:28:18.261 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0|
peer0.org1.example.com | 00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..|
peer0.org1.example.com | 00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....|
peer0.org1.example.com | 00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....|
peer0.org1.example.com | 00000040 e3 c1 76 f7 71 37 3f |..v.q7?|"
peer0.org1.example.com | "2019-05-02 09:28:18.262 UTC [chaincode] handleMessage -> DEBU 3e3b [6092491a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:28:18.263 UTC [chaincode] Notify -> DEBU 3e3c [6092491a] notifying Txid:6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8, channelID:"
peer0.org1.example.com | "2019-05-02 09:28:18.263 UTC [chaincode] Execute -> DEBU 3e3d Exit"
peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] callChaincode -> INFO 3e3e [][6092491a] Exit chaincode: name:"cscc" (6ms)"
peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] SimulateProposal -> DEBU 3e3f [][6092491a] Exit"
peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] func1 -> DEBU 3e40 Exit: request from 172.18.0.8:57486"
peer0.org1.example.com | "2019-05-02 09:28:18.266 UTC [comm.grpc.server] 1 -> INFO 3e41 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57486 grpc.code=OK grpc.call_duration=15.8301ms
peer0.org1.example.com | "2019-05-02 09:28:18.270 UTC [grpc] warningf -> DEBU 3e42 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57486: read: connection reset by peer"
peer0.org1.example.com | "2019-05-02 09:28:18.270 UTC [grpc] infof -> DEBU 3e43 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:18.801 UTC [gossip.comm] func1 -> DEBU 3e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e45 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e46 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e48 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [msp] DeserializeIdentity -> DEBU 3e49 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4b Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4c Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [policies] Evaluate -> DEBU 3e4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e50 0xc002730e00 gate 1556789298803173000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e51 0xc002730e00 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e52 0xc002730e00 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e53 0xc002730e00 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [msp.identity] Verify -> DEBU 3e54 Verify: digest = 00000000 97 7a 0d 86 07 b9 17 2e 1f 9b 1f 27 34 3c 69 8f |.z.........'4<i.|
peer0.org1.example.com | 00000010 25 44 2a e3 14 91 a6 86 fb 9e ad be 61 e1 98 f3 |%D*.........a...|"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [msp.identity] Verify -> DEBU 3e55 Verify: sig = 00000000 30 44 02 20 5d 7d 2a fa ac dd 0a bb 81 48 9c dc |0D. ]}*......H..|
peer0.org1.example.com | 00000010 cc 4c 86 14 42 37 07 06 e5 45 62 e4 10 58 44 23 |.L..B7...Eb..XD#|
peer0.org1.example.com | 00000020 91 25 8c 4f 02 20 60 56 59 8a 33 4d 42 a3 9e d9 |.%.O. `VY.3MB...|
peer0.org1.example.com | 00000030 68 dd 77 3a f0 f9 20 81 39 f0 7e bd 49 e2 50 18 |h.w:.. .9.~.I.P.|
peer0.org1.example.com | 00000040 67 fc be 09 53 90 |g...S.|"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e56 0xc002730e00 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e57 0xc002730e00 gate 1556789298803173000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e5c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 "
peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 "
peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e60 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e61 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e62 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e63 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e64 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e65 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e66 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e67 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e68 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e69 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e70 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e71 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e74 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.comm] func1 -> DEBU 3e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e78 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:18.882 UTC [gossip.gossip] handleMessage -> DEBU 3e7a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:18.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102E "
peer0.org1.example.com | "2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7d Sign: digest: F153887618E2AD95BAF15F5BF692723AC67F3474ED1DB640E00C678916A5E4A7 "
peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3e80 Sleeping 5s"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e81 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e82 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e83 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e85 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e86 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.041 UTC [gossip.comm] Send -> DEBU 3e87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e89 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.comm] func1 -> DEBU 3e8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e90 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e92 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e93 Verify: digest = 00000000 2a 5d 7a af 95 62 13 10 82 f3 f0 d2 58 8f 7f 06 |*]z..b......X...|
peer0.org1.example.com | 00000010 1c 71 1c cb 56 4b 76 b7 98 5e fa 36 0d 3e 6e 57 |.q..VKv..^.6.>nW|"
peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e94 Verify: sig = 00000000 30 45 02 21 00 f3 b3 a2 ee 9e 9e 39 c4 35 68 59 |0E.!.......9.5hY|
peer0.org1.example.com | 00000010 8d 0e 5c c4 f9 92 d8 54 bb 14 50 4c 45 3a d7 8a |..\....T..PLE:..|
peer0.org1.example.com | 00000020 03 a5 48 a9 0d 02 20 61 1f 8c 5d c5 ba a1 f2 19 |..H... a..].....|
peer0.org1.example.com | 00000030 fb 46 d5 89 e7 6c b4 28 3b be 27 57 8b 77 32 c8 |.F...l.(;.'W.w2.|
peer0.org1.example.com | 00000040 e3 c8 9c c6 e5 6d d2 |.....m.|"
peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e95 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e96 Verify: sig = 00000000 30 45 02 21 00 cc 7e 7b 1c b4 a2 32 09 73 fb ef |0E.!..~{...2.s..|
peer0.org1.example.com | 00000010 d6 65 9b ef 54 56 3b 50 b4 5b b7 88 93 46 2a ea |.e..TV;P.[...F*.|
peer0.org1.example.com | 00000020 a9 c9 ef 75 b6 02 20 59 f2 eb c1 77 76 2a 6d 64 |...u.. Y...wv*md|
peer0.org1.example.com | 00000030 54 18 90 2c aa df 1c 4c 1d 73 4f d8 fb d3 d3 71 |T..,...L.sO....q|
peer0.org1.example.com | 00000040 e5 b4 d6 db ea ac 9e |.......|"
peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e98 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e99 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 "
peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 "
peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e9d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e9e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.080 UTC [gossip.comm] func1 -> DEBU 3e9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.080 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.gossip] handleMessage -> DEBU 3ea1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eaa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eab Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.083 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ead Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eae Verify: digest = 00000000 f1 53 88 76 18 e2 ad 95 ba f1 5f 5b f6 92 72 3a |.S.v......_[..r:|
peer0.org1.example.com | 00000010 c6 7f 34 74 ed 1d b6 40 e0 0c 67 89 16 a5 e4 a7 |..4t...@..g.....|"
peer0.org1.example.com | "2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eaf Verify: sig = 00000000 30 44 02 20 6a b2 f8 a0 c7 ac f2 13 0f 93 6e 70 |0D. j.........np|
peer0.org1.example.com | 00000010 e1 5f 66 c7 88 7a ba 24 c9 4d d0 0e 72 df 12 89 |._f..z.$.M..r...|
peer0.org1.example.com | 00000020 46 77 87 fe 02 20 75 b4 73 1a bc df 53 8e cc c6 |Fw... u.s...S...|
peer0.org1.example.com | 00000030 e5 85 58 0e a9 c2 05 73 bf fd 40 9c ac 86 34 a7 |..X....s..@...4.|
peer0.org1.example.com | 00000040 a8 35 af fb b6 a1 |.5....|"
peer0.org1.example.com | "2019-05-02 09:28:19.088 UTC [gossip.comm] func1 -> DEBU 3eb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.088 UTC [gossip.gossip] handleMessage -> DEBU 3eb1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.089 UTC [gossip.discovery] isSentByMe -> DEBU 3eb2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.gossip] handleMessage -> DEBU 3eb4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.105 UTC [gossip.comm] func1 -> DEBU 3eb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3eb8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eba Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3ebb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.comm] func1 -> DEBU 3ebc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebe Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ebf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.152 UTC [gossip.comm] func1 -> DEBU 3ec0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.152 UTC [gossip.gossip] handleMessage -> DEBU 3ec1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ec2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:19.157 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.157 UTC [gossip.comm] func1 -> DEBU 3ec4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ec5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec6 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec7 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3eca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func1 -> DEBU 3ecb 0xc003a60850 gate 1556789299159529300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecc 0xc003a60850 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecd 0xc003a60850 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ece 0xc003a60850 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ecf Verify: digest = 00000000 c2 1c 0f 8d 4d a4 35 c6 43 ca 3b 2a bf 8e 8c 21 |....M.5.C.;*...!|
peer0.org1.example.com | 00000010 7e ae 71 d4 16 1d 50 0a 14 59 da 9b 92 7b 2e 91 |~.q...P..Y...{..|"
peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ed0 Verify: sig = 00000000 30 44 02 21 00 8c 0c ef 6e 8f b1 23 3f 6f 0e 99 |0D.!....n..#?o..|
peer0.org1.example.com | 00000010 47 c3 ef b0 eb 51 27 ec e2 ba de 49 83 9f 80 de |G....Q'....I....|
peer0.org1.example.com | 00000020 67 97 2e 00 89 02 1f 52 5b 4b db ca ec 2b 3e a2 |g......R[K...+>.|
peer0.org1.example.com | 00000030 e1 ab e0 3a 52 b0 76 2a 1e 2c df 5c 89 ab 7c 28 |...:R.v*.,.\..|(|
peer0.org1.example.com | 00000040 03 83 b5 47 6c d2 |...Gl.|"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [cauthdsl] func2 -> DEBU 3ed1 0xc003a60850 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [cauthdsl] func1 -> DEBU 3ed2 0xc003a60850 gate 1556789299159529300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed5 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 "
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edc Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ede Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3edf Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3ee9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3eea Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.170 UTC [msp] DeserializeIdentity -> DEBU 3eeb Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eed Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eee Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:19.177 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.172 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:19.464 UTC [endorser] ProcessProposal -> DEBU 3ef4 Entering: request from 172.18.0.8:57494"
peer0.org1.example.com | "2019-05-02 09:28:19.465 UTC [protoutils] ValidateProposalMessage -> DEBU 3ef5 ValidateProposalMessage starts for signed proposal 0xc003cc9a90"
peer0.org1.example.com | "2019-05-02 09:28:19.466 UTC [protoutils] validateChannelHeader -> DEBU 3ef6 validateChannelHeader info: header type 3"
peer0.org1.example.com | "2019-05-02 09:28:19.466 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef7 begin"
peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}"
peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef9 creator is valid"
peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [msp.identity] Verify -> DEBU 3efa Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.|
peer0.org1.example.com | 00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|"
peer0.org1.example.com | "2019-05-02 09:28:19.468 UTC [msp.identity] Verify -> DEBU 3efb Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M|
peer0.org1.example.com | 00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.|
peer0.org1.example.com | 00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I|
peer0.org1.example.com | 00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |.<V8.o...N......|
peer0.org1.example.com | 00000040 2a 04 7e ea b1 66 |*.~..f|"
peer0.org1.example.com | "2019-05-02 09:28:19.469 UTC [protoutils] checkSignatureFromCreator -> DEBU 3efc exits successfully"
peer0.org1.example.com | "2019-05-02 09:28:19.469 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efd validateChaincodeProposalMessage starts for proposal 0xc0024b6150, header 0xc003cc9ea0"
peer0.org1.example.com | "2019-05-02 09:28:19.470 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efe validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:28:19.470 UTC [endorser] preProcess -> DEBU 3eff [][9995e49a] processing txid: 9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63"
peer0.org1.example.com | "2019-05-02 09:28:19.471 UTC [endorser] SimulateProposal -> DEBU 3f00 [][9995e49a] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:28:19.471 UTC [endorser] callChaincode -> INFO 3f01 [][9995e49a] Entry chaincode: name:"qscc" "
peer0.org1.example.com | "2019-05-02 09:28:19.472 UTC [chaincode] Execute -> DEBU 3f02 Entry"
peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [qscc] Invoke -> DEBU 3f03 Invoke function: GetChainInfo on chain: businesschannel"
peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f04 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo"
peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f05 acl check(/Channel/Application/Readers)"
peer0.org1.example.com | "2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:19.475 UTC [policies] Evaluate -> DEBU 3f08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.475 UTC [msp] DeserializeIdentity -> DEBU 3f09 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:19.476 UTC [msp.identity] newIdentity -> DEBU 3f0a Creating identity instance for cert -----BEGIN CERTIFICATE-----
peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
peer0.org1.example.com | -----END CERTIFICATE-----"
peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func1 -> DEBU 3f0b 0xc0040ae7f0 gate 1556789299478061900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc0040ae7f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc0040ae7f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:19.479 UTC [cauthdsl] func2 -> DEBU 3f0e 0xc0040ae7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [cauthdsl] func2 -> DEBU 3f0f 0xc0040ae7f0 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [cauthdsl] func1 -> DEBU 3f10 0xc0040ae7f0 gate 1556789299478061900 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [policies] Evaluate -> DEBU 3f11 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func1 -> DEBU 3f14 0xc0040af970 gate 1556789299481981100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f15 0xc0040af970 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f16 0xc0040af970 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f17 0xc0040af970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)"
peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f18 0xc0040af970 principal evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func1 -> DEBU 3f19 0xc0040af970 gate 1556789299481981100 evaluation fails"
peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func1 -> DEBU 3f1d 0xc0040c21d0 gate 1556789299485203300 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1e 0xc0040c21d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1f 0xc0040c21d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:19.486 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f20 Checking if identity satisfies MEMBER role for Org1MSP"
peer0.org1.example.com | "2019-05-02 09:28:19.487 UTC [msp] Validate -> DEBU 3f21 MSP Org1MSP validating identity"
peer0.org1.example.com | "2019-05-02 09:28:19.488 UTC [msp] getCertificationChain -> DEBU 3f22 MSP Org1MSP getting certification chain"
peer0.org1.example.com | "2019-05-02 09:28:19.488 UTC [cauthdsl] func2 -> DEBU 3f23 0xc0040c21d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f24 Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.|
peer0.org1.example.com | 00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|"
peer0.org1.example.com | "2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f25 Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M|
peer0.org1.example.com | 00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.|
peer0.org1.example.com | 00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I|
peer0.org1.example.com | 00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |.<V8.o...N......|
peer0.org1.example.com | 00000040 2a 04 7e ea b1 66 |*.~..f|"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [cauthdsl] func2 -> DEBU 3f26 0xc0040c21d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [cauthdsl] func1 -> DEBU 3f27 0xc0040c21d0 gate 1556789299485203300 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f28 Signature set satisfies policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] handleMessage -> DEBU 3f2c [9995e49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] Notify -> DEBU 3f2d [9995e49a] notifying Txid:9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63, channelID:"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] Execute -> DEBU 3f2e Exit"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [endorser] callChaincode -> INFO 3f2f [][9995e49a] Exit chaincode: name:"qscc" (19ms)"
peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [endorser] SimulateProposal -> DEBU 3f30 [][9995e49a] Exit"
peer0.org1.example.com | "2019-05-02 09:28:19.491 UTC [endorser] func1 -> DEBU 3f31 Exit: request from 172.18.0.8:57494"
peer0.org1.example.com | "2019-05-02 09:28:19.491 UTC [comm.grpc.server] 1 -> INFO 3f32 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57494 grpc.code=OK grpc.call_duration=26.9711ms
peer0.org1.example.com | "2019-05-02 09:28:19.495 UTC [grpc] infof -> DEBU 3f33 transport: loopyWriter.run returning. connection error: desc = "transport is closing""
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [msp] DeserializeIdentity -> DEBU 3f34 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [msp] DeserializeIdentity -> DEBU 3f35 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] Send -> DEBU 3f36 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f38 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f39 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.213 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.215 UTC [gossip.comm] func1 -> DEBU 3f3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.215 UTC [gossip.gossip] handleMessage -> DEBU 3f3e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f3f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f40 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f41 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f43 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f44 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func1 -> DEBU 3f48 0xc003a59e70 gate 1556789300216616900 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f49 0xc003a59e70 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4a 0xc003a59e70 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc003a59e70 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp.identity] Verify -> DEBU 3f4c Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp.identity] Verify -> DEBU 3f4d Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc003a59e70 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc003a59e70 gate 1556789300216616900 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f52 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp.identity] Verify -> DEBU 3f54 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp.identity] Verify -> DEBU 3f55 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp] DeserializeIdentity -> DEBU 3f56 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp] DeserializeIdentity -> DEBU 3f57 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f58 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f59 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5a Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func1 -> DEBU 3f5e 0xc003b3bd60 gate 1556789300217987200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f5f 0xc003b3bd60 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f60 0xc003b3bd60 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f61 0xc003b3bd60 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [msp.identity] Verify -> DEBU 3f62 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [msp.identity] Verify -> DEBU 3f63 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [cauthdsl] func2 -> DEBU 3f64 0xc003b3bd60 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [cauthdsl] func1 -> DEBU 3f65 0xc003b3bd60 gate 1556789300217987200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f68 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.224 UTC [gossip.comm] func1 -> DEBU 3f6a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.224 UTC [gossip.comm] func1 -> DEBU 3f6b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.225 UTC [msp.identity] Verify -> DEBU 3f6c Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:20.225 UTC [msp.identity] Verify -> DEBU 3f6d Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [gossip.gossip] handleMessage -> DEBU 3f6e Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [gossip.gossip] handleMessage -> DEBU 3f6f Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f70 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f71 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f73 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f74 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f75 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func1 -> DEBU 3f79 0xc003b51f90 gate 1556789300226857400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7a 0xc003b51f90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7b 0xc003b51f90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7c 0xc003b51f90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f7d Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f7e Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [cauthdsl] func2 -> DEBU 3f7f 0xc003b51f90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [cauthdsl] func1 -> DEBU 3f80 0xc003b51f90 gate 1556789300226857400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f83 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f85 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f86 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp] DeserializeIdentity -> DEBU 3f87 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f89 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f8a Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f8b Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func1 -> DEBU 3f8f 0xc003e9de80 gate 1556789300228395200 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f90 0xc003e9de80 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f91 0xc003e9de80 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f92 0xc003e9de80 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp.identity] Verify -> DEBU 3f93 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp.identity] Verify -> DEBU 3f94 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f95 0xc003e9de80 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func1 -> DEBU 3f96 0xc003e9de80 gate 1556789300228395200 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f99 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9b Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9c Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [gossip.gossip] handleMessage -> DEBU 3f9d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [gossip.gossip] handleMessage -> DEBU 3f9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9f Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul|
peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3fa0 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N|
peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......|
peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..|
peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .|
peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|"
peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp] DeserializeIdentity -> DEBU 3fa1 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.230 UTC [msp] DeserializeIdentity -> DEBU 3fa2 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fa3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa4 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa5 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [cauthdsl] func1 -> DEBU 3fa9 0xc003c5a6d0 gate 1556789300232976000 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3faa 0xc003c5a6d0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3fab 0xc003c5a6d0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3fac 0xc003c5a6d0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [msp.identity] Verify -> DEBU 3fad Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....|
peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [msp.identity] Verify -> DEBU 3fae Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W|
peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/|
peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...|
peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.|
peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3faf 0xc003c5a6d0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func1 -> DEBU 3fb0 0xc003c5a6d0 gate 1556789300232976000 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb3 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [policies] Evaluate -> DEBU 3fb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [msp.identity] Verify -> DEBU 3fb5 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.|
peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|"
peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [msp.identity] Verify -> DEBU 3fb6 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......|
peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......|
peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R|
peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..|
peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|"
peer0.org1.example.com | "2019-05-02 09:28:20.235 UTC [msp] DeserializeIdentity -> DEBU 3fb7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [msp] DeserializeIdentity -> DEBU 3fb8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fba Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbb Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [policies] Evaluate -> DEBU 3fbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [policies] Evaluate -> DEBU 3fbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [policies] Evaluate -> DEBU 3fbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func1 -> DEBU 3fbf 0xc003c6e5c0 gate 1556789300237571500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc0 0xc003c6e5c0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc1 0xc003c6e5c0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc003c6e5c0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [msp.identity] Verify -> DEBU 3fc3 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.|
peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [msp.identity] Verify -> DEBU 3fc4 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)|
peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l|
peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l|
peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e|
peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc003c6e5c0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc003c6e5c0 gate 1556789300237571500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc9 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.239 UTC [policies] Evaluate -> DEBU 3fca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:20.239 UTC [gossip.gossip] handleMessage -> DEBU 3fcb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.comm] func1 -> DEBU 3fcc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.gossip] handleMessage -> DEBU 3fcd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [msp] DeserializeIdentity -> DEBU 3fce Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [msp] DeserializeIdentity -> DEBU 3fcf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.gossip] handleMessage -> DEBU 3fd0 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.545 UTC [gossip.comm] func1 -> DEBU 3fd1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9718092006768369141 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.545 UTC [gossip.gossip] handleMessage -> DEBU 3fd2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9718092006768369141 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.pull] HandleMessage -> DEBU 3fd3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9718092006768369141 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.pull] SendDigest -> DEBU 3fd4 Sending BLOCK_MSG digest: [5 6 7 8 1 2 3 4 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.gossip] handleMessage -> DEBU 3fd5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.comm] func1 -> DEBU 3fd6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.gossip] handleMessage -> DEBU 3fd7 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fd8 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fd9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fda Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.gossip] handleMessage -> DEBU 3fdb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:20.945 UTC [gossip.comm] func1 -> DEBU 3fdc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.945 UTC [gossip.gossip] handleMessage -> DEBU 3fdd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fde Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fdf Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fe0 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.comm] func1 -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.gossip] handleMessage -> DEBU 3fe3 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.gossip] handleMessage -> DEBU 3fe4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [msp] DeserializeIdentity -> DEBU 3fe7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fe8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fe9 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fea Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [policies] Evaluate -> DEBU 3feb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [policies] Evaluate -> DEBU 3fec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [policies] Evaluate -> DEBU 3fed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func1 -> DEBU 3fee 0xc003b2dec0 gate 1556789301601335400 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3fef 0xc003b2dec0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3ff0 0xc003b2dec0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3ff1 0xc003b2dec0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.602 UTC [msp.identity] Verify -> DEBU 3ff2 Verify: digest = 00000000 7f d7 1a ca 80 12 ba 3d d1 86 b9 f2 c2 95 11 8c |.......=........|
peer0.org1.example.com | 00000010 ed 11 ec b1 05 dc 29 fa e4 8d 60 ff 6e c8 d8 a1 |......)...`.n...|"
peer0.org1.example.com | "2019-05-02 09:28:21.602 UTC [msp.identity] Verify -> DEBU 3ff3 Verify: sig = 00000000 30 45 02 21 00 ea 44 01 df 40 c6 c7 6e c7 47 e3 |0E.!..D..@..n.G.|
peer0.org1.example.com | 00000010 1c 92 1d d6 ea 8a 5e 95 63 b2 7c 74 97 ae 56 50 |......^.c.|t..VP|
peer0.org1.example.com | 00000020 0d 3a 6d 2c d0 02 20 5d 5b ab a9 4f 64 03 d7 e5 |.:m,.. ][..Od...|
peer0.org1.example.com | 00000030 b5 88 26 0f 98 f0 62 4a 1b 73 39 e1 c1 7b f3 7f |..&...bJ.s9..{..|
peer0.org1.example.com | 00000040 a4 fa 53 87 66 61 9b |..S.fa.|"
peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [cauthdsl] func2 -> DEBU 3ff4 0xc003b2dec0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [cauthdsl] func1 -> DEBU 3ff5 0xc003b2dec0 gate 1556789301601335400 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [policies] Evaluate -> DEBU 3ff6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [policies] Evaluate -> DEBU 3ff7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [policies] Evaluate -> DEBU 3ff8 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [policies] Evaluate -> DEBU 3ff9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 "
peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffe Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fff Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 4000 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [gossip.discovery] sendMemResponse -> DEBU 4001 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [msp] DeserializeIdentity -> DEBU 4003 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [msp] DeserializeIdentity -> DEBU 4004 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [gossip.comm] Send -> DEBU 4005 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [gossip.discovery] sendMemResponse -> DEBU 4006 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:21.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4007 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4008 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4009 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.613 UTC [gossip.comm] func1 -> DEBU 400a Got message: GossipMessage: tag:EMPTY hello:<nonce:2881492675919787916 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.613 UTC [gossip.gossip] handleMessage -> DEBU 400b Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:2881492675919787916 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.614 UTC [gossip.pull] HandleMessage -> DEBU 400c GossipMessage: tag:EMPTY hello:<nonce:2881492675919787916 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.614 UTC [msp] DeserializeIdentity -> DEBU 400d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.615 UTC [msp] DeserializeIdentity -> DEBU 400e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.615 UTC [msp] DeserializeIdentity -> DEBU 400f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.616 UTC [msp] DeserializeIdentity -> DEBU 4010 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.616 UTC [msp] DeserializeIdentity -> DEBU 4011 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.617 UTC [msp] DeserializeIdentity -> DEBU 4012 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.618 UTC [gossip.pull] SendDigest -> DEBU 4013 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030"
peer0.org1.example.com | "2019-05-02 09:28:21.618 UTC [gossip.gossip] handleMessage -> DEBU 4014 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.comm] func1 -> DEBU 4015 Got message: GossipMessage: tag:EMPTY hello:<nonce:7529311170988199476 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.gossip] handleMessage -> DEBU 4016 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:7529311170988199476 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.pull] HandleMessage -> DEBU 4017 GossipMessage: tag:EMPTY hello:<nonce:7529311170988199476 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 4018 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 4019 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 401a Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401b Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.652 UTC [gossip.pull] SendDigest -> DEBU 401e Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:21.652 UTC [gossip.gossip] handleMessage -> DEBU 401f Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.681 UTC [gossip.comm] func1 -> DEBU 4020 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.gossip] handleMessage -> DEBU 4021 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.gossip] handleMessage -> DEBU 4022 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4023 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.683 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4024 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.683 UTC [msp] DeserializeIdentity -> DEBU 4025 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4026 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:21.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4027 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4028 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.685 UTC [policies] Evaluate -> DEBU 4029 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.686 UTC [policies] Evaluate -> DEBU 402a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:21.686 UTC [policies] Evaluate -> DEBU 402b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func1 -> DEBU 402c 0xc003c8ff90 gate 1556789301686951500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func2 -> DEBU 402d 0xc003c8ff90 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func2 -> DEBU 402e 0xc003c8ff90 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [cauthdsl] func2 -> DEBU 402f 0xc003c8ff90 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [msp.identity] Verify -> DEBU 4030 Verify: digest = 00000000 c6 4c ed 59 30 cd 8e bc 73 38 8d 55 c3 ee 3e 2b |.L.Y0...s8.U..>+|
peer0.org1.example.com | 00000010 76 58 ee 48 63 e2 5a 88 09 e1 36 90 5e 0c c1 5f |vX.Hc.Z...6.^.._|"
peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [msp.identity] Verify -> DEBU 4031 Verify: sig = 00000000 30 44 02 20 45 df dd 8b f3 62 ca 8b 79 56 6f 82 |0D. E....b..yVo.|
peer0.org1.example.com | 00000010 2f 2f b3 20 f1 89 2f c2 07 d7 00 af 0e 23 a0 e0 |//. ../......#..|
peer0.org1.example.com | 00000020 81 d7 32 ba 02 20 36 21 a4 5b 2b 61 ad 4d 75 49 |..2.. 6!.[+a.MuI|
peer0.org1.example.com | 00000030 c7 84 53 44 25 be ed 40 f0 68 b9 d0 3c 74 80 b7 |..SD%..@.h..<t..|
peer0.org1.example.com | 00000040 23 4f 18 35 73 8f |#O.5s.|"
peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [cauthdsl] func2 -> DEBU 4032 0xc003c8ff90 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [cauthdsl] func1 -> DEBU 4033 0xc003c8ff90 gate 1556789301686951500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [policies] Evaluate -> DEBU 4035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [policies] Evaluate -> DEBU 4036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [msp.identity] Sign -> DEBU 4034 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102F "
peer0.org1.example.com | "2019-05-02 09:28:21.690 UTC [msp.identity] Sign -> DEBU 4037 Sign: digest: CA9CC4BC7099F6C11A7CF67D70018177C2CA667CBBF6C2B3F84BAC5789CEEEA9 "
peer0.org1.example.com | "2019-05-02 09:28:21.691 UTC [msp.identity] Sign -> DEBU 4038 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 "
peer0.org1.example.com | "2019-05-02 09:28:21.691 UTC [msp.identity] Sign -> DEBU 4039 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 "
peer0.org1.example.com | "2019-05-02 09:28:21.690 UTC [policies] Evaluate -> DEBU 403a Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.692 UTC [gossip.comm] Send -> DEBU 403b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.692 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [msp] DeserializeIdentity -> DEBU 403e Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [gossip.comm] Send -> DEBU 403f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.694 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.694 UTC [gossip.comm] sendToEndpoint -> DEBU 4041 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4042 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4043 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4044 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.696 UTC [gossip.comm] sendToEndpoint -> DEBU 4046 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [policies] Evaluate -> DEBU 4045 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 4047 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 4048 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 4049 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 "
peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 404a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 "
peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 404b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:21.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 404c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 404d Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [gossip.discovery] sendMemResponse -> DEBU 404e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd"
peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 404f Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 4050 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 4051 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] Send -> DEBU 4052 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.discovery] sendMemResponse -> DEBU 4054 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4055 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.comm] sendToEndpoint -> DEBU 4056 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] func1 -> DEBU 4057 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.gossip] handleMessage -> DEBU 4058 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4053 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4059 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [gossip.comm] func1 -> DEBU 405a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 405b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.708 UTC [gossip.gossip] handleMessage -> DEBU 405c Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.708 UTC [gossip.gossip] handleMessage -> DEBU 405e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4060 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4061 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4064 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [cauthdsl] func1 -> DEBU 4065 0xc0039779f0 gate 1556789301713908100 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4066 0xc0039779f0 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4067 0xc0039779f0 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4068 0xc0039779f0 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [msp.identity] Verify -> DEBU 4069 Verify: digest = 00000000 7f d7 1a ca 80 12 ba 3d d1 86 b9 f2 c2 95 11 8c |.......=........|
peer0.org1.example.com | 00000010 ed 11 ec b1 05 dc 29 fa e4 8d 60 ff 6e c8 d8 a1 |......)...`.n...|"
peer0.org1.example.com | "2019-05-02 09:28:21.715 UTC [msp.identity] Verify -> DEBU 406a Verify: sig = 00000000 30 45 02 21 00 ea 44 01 df 40 c6 c7 6e c7 47 e3 |0E.!..D..@..n.G.|
peer0.org1.example.com | 00000010 1c 92 1d d6 ea 8a 5e 95 63 b2 7c 74 97 ae 56 50 |......^.c.|t..VP|
peer0.org1.example.com | 00000020 0d 3a 6d 2c d0 02 20 5d 5b ab a9 4f 64 03 d7 e5 |.:m,.. ][..Od...|
peer0.org1.example.com | 00000030 b5 88 26 0f 98 f0 62 4a 1b 73 39 e1 c1 7b f3 7f |..&...bJ.s9..{..|
peer0.org1.example.com | 00000040 a4 fa 53 87 66 61 9b |..S.fa.|"
peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [cauthdsl] func2 -> DEBU 406b 0xc0039779f0 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [cauthdsl] func1 -> DEBU 406c 0xc0039779f0 gate 1556789301713908100 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [policies] Evaluate -> DEBU 406d Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 406e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 406f Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 4070 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 4071 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 4072 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4073 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [msp.identity] Verify -> DEBU 4074 Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w|
peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|"
peer0.org1.example.com | "2019-05-02 09:28:21.719 UTC [msp.identity] Verify -> DEBU 4075 Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/|
peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....|
peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;|
peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..|
peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|"
peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 4076 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] isSentByMe -> DEBU 4078 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 4079 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.comm] func1 -> DEBU 4077 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.gossip] handleMessage -> DEBU 407b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.gossip] handleMessage -> DEBU 407c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.723 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.723 UTC [msp.identity] Verify -> DEBU 407f Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w|
peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|"
peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [msp.identity] Verify -> DEBU 4080 Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/|
peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....|
peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;|
peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..|
peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|"
peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [gossip.discovery] handleAliveMessage -> DEBU 4081 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [gossip.discovery] isSentByMe -> DEBU 4082 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 4083 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4084 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [msp] DeserializeIdentity -> DEBU 4085 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4086 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]"
peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4087 Got policy manager for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4088 Got reader policy for channel [businesschannel] with flag [true]"
peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [policies] Evaluate -> DEBU 4089 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [policies] Evaluate -> DEBU 408a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign"
peer0.org1.example.com | "2019-05-02 09:28:21.727 UTC [policies] Evaluate -> DEBU 408b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers =="
peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func1 -> DEBU 408c 0xc00399b210 gate 1556789301728076500 evaluation starts"
peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408d 0xc00399b210 signed by 0 principal evaluation starts (used [false])"
peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408e 0xc00399b210 processing identity 0 with bytes of 10fffc0"
peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408f 0xc00399b210 principal matched by identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.729 UTC [msp.identity] Verify -> DEBU 4090 Verify: digest = 00000000 c6 4c ed 59 30 cd 8e bc 73 38 8d 55 c3 ee 3e 2b |.L.Y0...s8.U..>+|
peer0.org1.example.com | 00000010 76 58 ee 48 63 e2 5a 88 09 e1 36 90 5e 0c c1 5f |vX.Hc.Z...6.^.._|"
peer0.org1.example.com | "2019-05-02 09:28:21.729 UTC [msp.identity] Verify -> DEBU 4091 Verify: sig = 00000000 30 44 02 20 45 df dd 8b f3 62 ca 8b 79 56 6f 82 |0D. E....b..yVo.|
peer0.org1.example.com | 00000010 2f 2f b3 20 f1 89 2f c2 07 d7 00 af 0e 23 a0 e0 |//. ../......#..|
peer0.org1.example.com | 00000020 81 d7 32 ba 02 20 36 21 a4 5b 2b 61 ad 4d 75 49 |..2.. 6!.[+a.MuI|
peer0.org1.example.com | 00000030 c7 84 53 44 25 be ed 40 f0 68 b9 d0 3c 74 80 b7 |..SD%..@.h..<t..|
peer0.org1.example.com | 00000040 23 4f 18 35 73 8f |#O.5s.|"
peer0.org1.example.com | "2019-05-02 09:28:21.730 UTC [cauthdsl] func2 -> DEBU 4092 0xc00399b210 principal evaluation succeeds for identity 0"
peer0.org1.example.com | "2019-05-02 09:28:21.730 UTC [cauthdsl] func1 -> DEBU 4093 0xc00399b210 gate 1556789301728076500 evaluation succeeds"
peer0.org1.example.com | "2019-05-02 09:28:21.730 UTC [policies] Evaluate -> DEBU 4094 Signature set satisfies policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4095 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4096 Signature set satisfies policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4097 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers"
peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [gossip.discovery] handleAliveMessage -> DEBU 4098 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleAliveMessage -> DEBU 4099 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 409a Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.gossip] handleMessage -> DEBU 409b Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 409c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.733 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 409d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.733 UTC [msp.identity] Verify -> DEBU 409e Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w|
peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|"
peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 409f Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/|
peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....|
peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;|
peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..|
peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|"
peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 40a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|"
peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 40a1 Verify: sig = 00000000 30 45 02 21 00 bb 34 a9 dc 99 ea 3d 09 e3 13 7b |0E.!..4....=...{|
peer0.org1.example.com | 00000010 3f ca 0f fc ee 43 bc 7a 98 5c d0 c7 ed 12 6a ef |?....C.z.\....j.|
peer0.org1.example.com | 00000020 1d bd d7 5f c1 02 20 66 44 8d 3f c3 82 8e d5 8d |..._.. fD.?.....|
peer0.org1.example.com | 00000030 dc 0e 36 be 81 6c 8e c6 20 8d 11 0a bc 80 ab e2 |..6..l.. .......|
peer0.org1.example.com | 00000040 dc b4 ff fb 41 6a 77 |....Ajw|"
peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] isSentByMe -> DEBU 40a3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a4 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a5 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.744 UTC [gossip.comm] func1 -> DEBU 40a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.744 UTC [gossip.comm] func1 -> DEBU 40a7 Got message: GossipMessage: tag:EMPTY hello:<nonce:16793505579338578006 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.745 UTC [gossip.gossip] handleMessage -> DEBU 40a8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.745 UTC [gossip.gossip] handleMessage -> DEBU 40a9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.746 UTC [gossip.gossip] handleMessage -> DEBU 40aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16793505579338578006 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.746 UTC [gossip.pull] HandleMessage -> DEBU 40ab GossipMessage: tag:EMPTY hello:<nonce:16793505579338578006 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.pull] SendDigest -> DEBU 40ac Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40af Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store"
peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.gossip] handleMessage -> DEBU 40ae Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.748 UTC [msp.identity] Verify -> DEBU 40b0 Verify: digest = 00000000 2c 5f d5 59 73 24 4c a4 78 59 94 18 c7 e9 7a d2 |,_.Ys$L.xY....z.|
peer0.org1.example.com | 00000010 64 ff 87 c0 e1 29 65 24 e9 02 86 d0 0b e7 04 d0 |d....)e$........|"
peer0.org1.example.com | "2019-05-02 09:28:21.749 UTC [msp.identity] Verify -> DEBU 40b1 Verify: sig = 00000000 30 45 02 21 00 ee 41 21 9e 1a 5a f8 e2 91 78 a1 |0E.!..A!..Z...x.|
peer0.org1.example.com | 00000010 da 0e f1 68 b4 b3 b8 71 18 25 63 f3 1f be 13 26 |...h...q.%c....&|
peer0.org1.example.com | 00000020 67 8a ae 12 29 02 20 5d 77 7d 37 ca 4e 8c 2b 9f |g...). ]w}7.N.+.|
peer0.org1.example.com | 00000030 71 b3 27 67 69 99 c2 46 de e5 51 7e 45 93 3f cb |q.'gi..F..Q~E.?.|
peer0.org1.example.com | 00000040 24 ec 45 16 57 13 f0 |$.E.W..|"
peer0.org1.example.com | "2019-05-02 09:28:21.749 UTC [msp.identity] Verify -> DEBU 40b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|"
peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [msp.identity] Verify -> DEBU 40b3 Verify: sig = 00000000 30 45 02 21 00 fb 7f 92 06 21 7a fc 06 6d d5 9b |0E.!.....!z..m..|
peer0.org1.example.com | 00000010 d6 62 b4 09 16 c5 97 5d 6a 12 61 1f 83 6f 78 cd |.b.....]j.a..ox.|
peer0.org1.example.com | 00000020 02 40 01 76 10 02 20 45 8a f1 6a ac 2a a5 c9 6d |.@.v.. E..j.*..m|
peer0.org1.example.com | 00000030 5e 6f c2 8b 77 46 5e fc 93 75 10 ec 3b 4d e6 6a |^o..wF^..u..;M.j|
peer0.org1.example.com | 00000040 8e 63 37 e3 1d 9c 77 |.c7...w|"
peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 40b4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}"
peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b6 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 "
peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 "
peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership"
peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b9 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 40ba Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40bb Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.752 UTC [gossip.discovery] sendMemResponse -> DEBU 40bc Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7"
peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [msp] DeserializeIdentity -> DEBU 40bd Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [msp] DeserializeIdentity -> DEBU 40be Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [gossip.comm] Send -> DEBU 40bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.comm] sendToEndpoint -> DEBU 40c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.comm] sendToEndpoint -> DEBU 40c2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.discovery] sendMemResponse -> DEBU 40c0 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0"
peer0.org1.example.com | "2019-05-02 09:28:21.841 UTC [gossip.pull] Hello -> DEBU 40c3 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.comm] Send -> DEBU 40c4 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9028287631272026798 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.pull] Hello -> DEBU 40c5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c6 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c7 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.pull] Hello -> DEBU 40c8 Sending BLOCK_MSG hello to peer1.org1.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c9 Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [msp] DeserializeIdentity -> DEBU 40ca Obtaining identity"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] Send -> DEBU 40cb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10786296609119762845 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10786296609119762845 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cd Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] Send -> DEBU 40ce Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7666957482472577737 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.845 UTC [gossip.pull] Hello -> DEBU 40d0 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051"
peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] sendToEndpoint -> DEBU 40d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7666957482472577737 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] sendToEndpoint -> DEBU 40d3 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] Send -> DEBU 40d4 Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16141346674960453334 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers"
peer0.org1.example.com | "2019-05-02 09:28:21.845 UTC [gossip.comm] func1 -> DEBU 40d1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9028287631272026798 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.gossip] handleMessage -> DEBU 40d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.pull] HandleMessage -> DEBU 40d7 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.comm] sendToEndpoint -> DEBU 40d6 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.848 UTC [gossip.comm] sendToEndpoint -> DEBU 40d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16141346674960453334 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.848 UTC [gossip.comm] sendToEndpoint -> DEBU 40da Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.comm] func1 -> DEBU 40db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40dc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.pull] HandleMessage -> DEBU 40dd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40de Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.comm] func1 -> DEBU 40df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40e0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.pull] HandleMessage -> DEBU 40e1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40e2 Exiting"
peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.comm] func1 -> DEBU 40e3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.gossip] handleMessage -> DEBU 40e4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.pull] HandleMessage -> DEBU 40e5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes"
peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.gossip] handleMessage -> DEBU 40e6 Exiting"